Hackers use fileless threats to take advantage of existing applications and attack systems. Here we discuss noteworthy events, techniques, and best practices that can help identify fileless threats and defend against attacks.
Threat actors are targeting Linux servers with vulnerable software, namely the project management tool Jira and the message transfer agent Exim, using a variant of the Watchbog trojan, which drops a Monero miner to expand their botnet.
While still in development, cloud solutions are beginning to address their customers' needs for improving online security, complying with regulations, scaling up operations, and exploring new business opportunities.
The total amount cybercriminals attempted to steal via business email compromise (BEC) scams rose to an alarming average of US$301 million per month — a substantial increase from the US$110 million monthly average that was tracked in 2016.