Remove Authentication Remove DNS Remove Information Security Remove Security Intelligence
article thumbnail

European firm DSIRF behind the attacks with Subzero surveillance malware

Security Affairs

Researchers from threat intelligence firm RiskIQ, using passive DNS data related to Knotweed attacks, linked the C2 infrastructure used by the malware since February 2020 to DSIRF. Confirm that Microsoft Defender Antivirus is updated to security intelligence update 1.371.503.0 or later to detect the related indicators.

article thumbnail

Cybersecurity Checklist for Political Campaigns

Lenny Zeltser

Enabling two-factor authentication is perhaps the most important step toward resisting such tactics (attackers have intercepted SMS codes, so use other methods, if possible). More broadly: Enable two-factor authentication everywhere. Require authentication for printer, server, computer, and device access even on local networks.

article thumbnail

Black Hat Asia 2022 Continued: Cisco Secure Integrations

Cisco Security

Malware Threat Intelligence made easy and available, with Cisco Secure Malware Analytics and SecureX by Ben Greenbaum . SecureX: Bringing Threat Intelligence Together by Ian Redden . SecureX extended detection and response platform, with orchestration and device insights integration with Meraki and Secure Endpoint .

Malware 72