article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

The government alleges the men used malware-laced phishing emails and “supply chain” attacks to steal data from companies and their customers. One of the alleged hackers was first profiled here in 2012 as the owner of a Chinese antivirus firm. Image: FBI. Chengdu404’s offices in China. Image: DOJ.

Antivirus 356
article thumbnail

Work from Home leading to surge in Cyber Attacks in UK

CyberSecurity Insiders

The Work from Home (WfH) culture might do well to the employees, but some companies are disclosing openly that they are witnessing a surge in cyber attacks( mainly data breaches) on their IT infrastructure as their employees are not following basic cyber hygiene of using strong passwords and authenticating their Identity whole accessing networks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The German BSI agency recommends replacing Kaspersky antivirus software

Security Affairs

The Agency warns the cybersecurity firm could be implicated in hacking attacks during the ongoing Russian invasion of Ukraine. According to §7 BSI law, the BSI warns against the use of Kaspersky Antivirus and recommends replacing it asap with defense solutions from other vendors. ” reads the BSI announcement. Pierluigi Paganini.

Antivirus 104
article thumbnail

How Can I Protect My Company From Cyber-Attacks?

Cytelligence

As technology continues to advance, so do the risks of cyber attacks. It has become increasingly important for businesses of all sizes to protect themselves from cyber threats. From small businesses to large corporations, no company is safe from a cyber attack.

article thumbnail

MY TAKE: What NortonLifeLock’s $8 billion buyout of Avast portends for consumer security

The Last Watchdog

This deal reads like to the epilogue to a book titled The First 20 Years of the Supremely Lucrative Antivirus Market. Way back in 1990, Symantec acquired Norton Utilities and made Norton the heart of its antivirus subscription offering. Related: The coming of ubiquitous passwordless access.

Antivirus 223
article thumbnail

BEST PRACTICES – 9 must-do security protocols companies must embrace to stem remote work risks

The Last Watchdog

Use antivirus software. Your devices need excellent antivirus software to act as the next defense line by blocking and detecting known malware. If the malware finds its way onto your device, your antivirus will see it and, in most cases, remove it. Firewalls help, but threats will inevitably get through. Secure home router.

VPN 214
article thumbnail

Cyber Insurance and the Changing Global Risk Environment

Security Affairs

This shift to digital technology has created a new class of digital risks that are constantly evolving and strike faster and often with more severity than traditional risks. Our reliance on digital technology and the inherited risk is a key driving factor for buying cyber risk insurance.