Overall volumes of banking Trojans and RATs increased during the third quarter, when Emotet was suspiciously absent until mid-September. Emotet re-emerged toward the end of September, ending a months-long hiatus that gave banking Trojans and remote access Trojans (RATs) room to increase in the third quarter. As a result of Emotet’s absence for the first
All organizations with Windows infrastructures should make sure their systems are patched to current versions, Rapid7 suggests. An exploit for BlueKeep, a vulnerability in Microsoft’s Remote Desktop Protocol (RDP) that can allow remote code execution, is the subject of the latest pull request of Metasploit, the open source exploit framework widely used by security researchers.
New controls and threat detection capabilities built into Box aim to prevent accidental data leakage and misuse. Box today released a new set of security controls called Box Shield that detects when data hosted by the cloud-based service is accidentally shared or misused as it travels inside and outside an organization. The idea is to
Attendees will learn how orchestration and automation can be a part of network operations and security, even at smaller companies. Nothing can really replace seeing technology in action and putting hands on the controls to aid in understanding and boost confidence. At Interop ITX, that capability is called the Interop19 Demonstration Showcase, and this year
Windows Defender becomes Microsoft Defender, and it’s available in limited preview for Mac users. Microsoft is renaming its Windows Defender antivirus protection tool and bringing its security capabilities to macOS devices in a “limited preview” mode now available to businesses. Starting today, Microsoft Defender Advanced Threat Protection (ATP) will be available for Mac; with this
Adantium, developed by Google, brings communication encryption to bear on storage security. Android devices come in a wide range of CPU power and memory configurations. Until recently, those on the lower end of the range weren’t required to offer encrypted storage. The reason? The most common encryption scheme, AES256, requires too much from the CPU:
Among the problems: TLS certificates are expiring and websites are becoming inaccessible. The partial shutdown of the federal government is having an impact in ways both anticipated and not. One that probably falls under the latter is expiring TLS certificates that leave some .gov websites marked as “unsafe” or completely inaccessible from most browsers. Websites