Remove endpoint-security cybercrime-as-a-service-no-end-in-sight
article thumbnail

Black Hat Asia 2022 Continued: Cisco Secure Integrations

Cisco Security

Self Service with SecureX Orchestration and Slack by Matt Vander Horst . Malware Threat Intelligence made easy and available, with Cisco Secure Malware Analytics and SecureX by Ben Greenbaum . SecureX extended detection and response platform, with orchestration and device insights integration with Meraki and Secure Endpoint .

Malware 72
article thumbnail

EP 49: LoL

ForAllSecure

Kyle Hanslovan CEO of Huntress Labs joins The Hacker Mind to discuss recent LoL attacks, specifically the Microsoft Follina attack and the Kaseya ransomware attack, and how important it is for small and medium sized businesses to start using enterprise grade security, given the evolving nature of these attacks. Think of it as a Trojan horse.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybercrooks Are Increasingly Adept at Gaming Google's Services

SecureWorld News

Scammers and malware authors know a good opportunity when they see one, especially if it's a vulnerability in a popular web service. Its search algorithms and security mechanisms boast unmatched sophistication, but when a well-motivated adversary steps in, they aren't effective enough to stop all forms of exploitation in their tracks.

article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

Mikko Hypponen joins The Hacker Mind to discuss cybercrime unicorns, the fog of cyber war that surrounds the Ukrainian war with its much larger neighbor, and of course Mikko’s new book, If it’s Smart, it’s Vulnerable. A cyberwar. That event did more damage than any computer virus or worm at the time. But most of us failed.

article thumbnail

SolarWinds attackers leveraged trust in Constant Contact email marketing, USAID, to launch campaign

SC Magazine

The Russian state-sponsored hackers behind the SolarWinds supply chain attack relied on a decidedly more cybercrime-styled playbook for their latest reported attack, launching a sweeping phishing campaign designed to distribute malware to organizations via weaponized communications sent from a compromised email marketing account.