Remove Architecture Remove IoT Remove Malware Remove Social Engineering
article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

Malware Analysis: Explore malware types, their behavior, and the techniques used for analyzing and detecting them. Investigate malware’s propagation methods, evasion techniques, and methods for identifying and mitigating potential threats.

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

IoT Security: Examine the vulnerabilities and challenges associated with securing the Internet of Things (IoT) devices and networks. Explore topics such as authentication protocols, encryption mechanisms, and anomaly detection techniques to enhance the security and privacy of IoT ecosystems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Uncommon infection methods—part 2

SecureList

In this blog post, we provide excerpts from the recent reports that focus on uncommon infection methods and describe the associated malware. RapperBot then determines the processor architecture and infects the device. According to the author, the malware: Is written in C/C++, while the C2 is written in Golang. Evades EDR/AV.

Malware 111
article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

Not long ago, it was revealed that T-Mobile had been breached by bad actors who convinced employees to switch their SIM cards to let them bypass two-factor identification — reminding us how effective social engineering can still be. When malware first breaches a network, it doesn’t make its presence known right away.

DNS 140
article thumbnail

Reading the ENISA Threat Landscape Report 2018

Security Affairs

Nation-state hacking reduced the use of complex malware and appears to go towards low profile social engineering attacks. The main trends emerged in the 2018’s cyberthreat landscape are: Mail and phishing messages have become the primary malware infection vector. ” reads the ENISA Threat Landscape Report 2018.

article thumbnail

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

Reducing the risk of attacks such as ransomware and malware on CNI will be of paramount importance to the stability of nation states for years to come. Malware and ransomware attacks are relatively low-cost operations but can result in big pay-outs for threat actors. The Threat of Ransomware.

article thumbnail

Fintech Cybersecurity Trends in 2021

Security Boulevard

When the pandemic struck, online bad actors took it as an opportunity to double-down on their attacks through ransomware, malware, and social engineering. SASE network architecture, like multi-cloud storage, brings multiple systems together to link security solutions for the greatest effect. Article by Beau Peters.