Enterprise security executives generally don’t plan for nation-state-level cyberattacks on their businesses. That may change going forward, when analyzing new trends in hacking and cybersecurity.
Heading into 2022 there are three key areas where security leaders need to be well-versed: innovations in eSkimming methods, intensifying pressure from ransomware campaigns on the payments ecosystem and the supply chain, and sophisticated enumeration attacks that impact and payments ecosystem.
Lookout, Inc. released a report showing that mobile phishing exposure surged 161% within the energy industry between the second half of 2020 and the first half of 2021.
Security researchers at the Lookout Threat Labs have discovered a new Android malware, dubbed AbstractEmu, with rooting capabilities distributed on Google Play and major third-party stores, including the Amazon Appstore and Samsung Galaxy Store.
Malware authors often take advantage of vulnerabilities in popular software. But, malware is also prone to bugs and coding errors, causing it to crash and serve as backdoors — any method by which authorized and unauthorized users can get around normal security measures and gain high-level user access — for white hat hackers.
HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools
October 14, 2021
HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools.
While researching a misconfiguration in the popular workflow platform Apache Airflow, Intezer discovered several unprotected instances. These unsecured instances expose companies’ sensitive information across various industries.
How long does a cybercriminal’s timeline usually take? What are their moves? And what tools do they usually employ? To answer these questions, it helps to think like a hacker.