article thumbnail

Amazon Sidewalk highlights network security visibility risks consumer services pose

CSO Magazine

The research also discovered a novel use of Houdini malware to spoof devices and exfiltrate data within the user agent field, a method often undetected by legacy security systems. The findings come as vast numbers of employees continue to work from home and connect to corporate networks remotely.

article thumbnail

Ransomware world in 2021: who, how and why

SecureList

Well-known malware families are involved in the biggest and most wide-reaching campaigns. Their main objective is to create networks of infected computers, though the infection is only dormant at this point. When malware operators work with partners, they avoid using the malware in the jurisdiction where they are based.