We've seen malware that takes advantage of cloud-based sharing sites such as DropBox, Sendspace, and Evernote. Add Google Drive to that list. We recently came across malware that uses Google Drive as one way of siphoning information from its victims.
A recent investigation revealed that the Sandworm zero day exploit could likely be used to target GE Intelligent Platform CIMPLICITY users. Find out what it does and how you can safeguard your systems against this emerging attack.
Microsoft has announced the discovery of a zero-day vulnerability affecting all supported versions of Microsoft Windows and Windows Server 2008 and 2012 that is being used in attacks against NATO and several European industries and sectors.
The backdoor malware MIRAS got an upgrade from just running in 32-bit Windows operating system versions to 64-bit ones, expanding its victim range to more users of the OS. MIRAS is the same malware family linked to attacks against a Europe-based IT company.
Threats analyst Bryant Tan shares some rules that IT administrators can proactively implement to set up “basic defense” for their network. These rules are not meant to cover all types of suspicious activity but are important in building a secure network.