Technology news for Australia's largest enterprises
These search results are from across the Techday network of sites
Sophos unearths origin of prominent cryptominer
The cryptominer was recently discovered when attackers targeted internet-facing database servers (SQL servers), and the MrbMiner was downloaded and installed.
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.
Phishing URLs grew by 640% last year - report
“In the cybersecurity industry the only certainty is that there is no certainty, and there is no single silver bullet solution.”
Five tips to defend against cryptojacking - Bitglass
The incidence of cryptojacking has seen rapid growth and has emerged as a favourite strategy for hackers.
Wandera reports on the state of mobile security in financial services
“In the financial services industry, as in many sectors, the security of client information is the most important asset."
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Cyber threats progressing as defenses evolve - Trustwave
The findings illustrate cybercriminals deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills.
Survey shows organisations in the dark about shadow mining threat
To be successful and remain undetected, shadow mining depends on deliberately configuring security systems to function incorrectly.
New threats on the block: Formjacking, IoT, LotL attacks
Symantec's report provides an overview of the threat landscape, including insights into global threat activity, cyber criminal trends, and motivations for attackers.
Cryptomining apps discovered on Microsoft’s app store
It is believed that the eight apps were likely developed by the same person or group.
2018 sees 1,500% increase in coinmining malware - report
This issue will only continue to grow as IoT forms the foundation of connected devices and smart city grids.
Mac malware on WatchGuard’s top ten list for first time
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.
Exclusive: Securing cloud data in the APAC environment
The majority of users are unable to develop good cyber hygiene in line with the rapid rate of digitalisation that the APAC region is undergoing.
Pseudo-ransomware Xbash targeting Linux and Windows discovered
Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities.
Exclusive: Why NZ is particularly vulnerable to cryptomining
Cryptomining is the newest cybersecurity threat dominating the headlines, but awareness of the attack method is still lacking among organisations.
Exclusive: Demystifying cryptojacking and how organisations can protect themselves
Cryptojacking is the latest step in the evolution of malware monetisation methods.
Here’s what the threat landscape currently looks like, according to Fortinet
Fortinet says there are indications that some cybercriminals now prefer hijacking systems and using them for cryptomining.
EXCLUSIVE: Rick McElroy shares how he’d breach an enterprise
Carbon Black’s Rick McElroy asserts at the end of the day, cyberwar is not about systems but rather humans vs humans as they are the weakest link.
Cryptominers posing a new threat for enterprise IT infrastructures
As well as viruses, trojans, worms and ransomware attacks, IT managers now have a new threat to worry about: cryptominers.
Data centres beware: New report predicts imminent attacks
Cryptomining is increasingly outdoing ransomware in popularity but cybercriminals are running out of CPU, painting data centres as prime targets.
Report finds legacy cybersecurity a cinch for modern cybercrime
Data collected in 2017 shows that attacks like ransomware and cryptojacking are easily bypassing legacy security solutions due to lax businesses.