Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bots

Emotet Comeback: New Campaign Using Binary Padding to Evade Detection

Emotet is undoubtedly a very resilient botnet. Even though its operation was disrupted by Europol in January 2021, Emotet came back a few months later and continues to spread. In May 2022, shortly after Microsoft released new controls related to malicious macros, Netskope Threat Labs analyzed an Emotet campaign where they were testing a new delivery method, by using LNK files.

Stalkerware Exposed | Cybersecurity Sessions #16 with Martijn Grooten

Our reliance on personal mobile devices leaves us vulnerable to attack; not just from anonymous criminal groups, but in some cases, from those closest to us. Stalkerware, a category of apps designed to secretly monitor the unsuspecting victim whose device they’re installed on, are a growing concern for security and privacy advocates, as well as law enforcement agencies.

The Dark Side of AI: How Malicious Bots May Exploit ChatGPT

In recent years, the world of artificial intelligence (AI) has seen a significant increase in the use of language models. ChatGPT, a language generation model developed by OpenAI, has been making waves in the news with its ability to process large amounts of data, which can be used to train machine learning models and to test them. One feature that’s grabbed headlines is its ability to write code and provide feedback on the accuracy and efficiency of code.

Why Bots Threaten Your Cybersecurity

Say what you want about bots, but you have to admire their versatility. Bots do everything from rank Google results and serve up cat photos on your Facebook feed, to sway elections and defraud retailers. Basically, they’re quite flexible. These days, bad bots are big business, with cybercriminals around the world using them to fraudulently access accounts, attack networks, and steal data.

Cyber Trends for 2023: The Bots are Still Coming, but Humans are Driving Them

If one topic has been on the minds of CISOs and CIOs alike over the last three years of Covid and post-Covid hybrid enterprise work environments, it’s ransomware. A distributed tech workforce — using distributed software services — proved to be no match for highly automated ransomware bots and malware executing encryption attacks. But this year, like the end of War of the Worlds, the attacking bots may suddenly fall silent.

Newsworthy Data Leaks | Cybersecurity Sessions #15 with Jurgita Lapienytė

Not a week goes by without a massive data leak being reported in the news – both in tech publications and across mainstream media. According to Atlas VPN, 5.9 billion credentials were leaked in 2021 alone. But it’s not just credentials under attack; personal data, payment information, sensitive corporate data, and even source code are all at risk of being leaked. But how is so much data leaked so often? What do criminals do with this data once they have it? How much risk does this pose to the public, and what can be done about it?

The 443 Episode 224 - Reviving a Dead Botnet

This week on the podcast we cover a recent analysis by Mandiant on a Russia-based APT using a decade old botnet to deliver new attacks. Before that, we cover an update from LastPass about their most recent breach as well as the 200 million Twitter accounts leaked last week. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Netacea Achieves SOC 2 Compliance in Data Security, Availability, Confidentiality, and Privacy

Today, we’re proud to announce that Netacea is officially SOC 2 Type I compliant across four areas: security, availability, confidentiality, and privacy. This significant achievement demonstrates our commitment to keeping customer data safe and secure. While delivering the most accurate bot detection capability in the market, and protecting millions of accounts and transactions daily, Netacea processes and stores trillions of rows of customer data.

The Behavioral Science of Cybersecurity | Cybersecurity Sessions #14 with Si Pavitt & Steve Dewsnip

If a stranger walked into your workplace and asked you your name and email address, would you co-operate? What if they asked you to open a door for them, or to use your laptop or phone, all whilst wearing a shirt that said “CHALLENGE ME” on it?