An Intellyx Brain Candy Brief Cybersecurity is finally becoming a c-suite and board-level concern. The combination of recent and massive SEC fines and a spate…
As the 2017 Equifax data breach illustrates, unpatched software represents a massive cybersecurity challenge for enterprises today. In that case, the vulnerability in question was…
An Intellyx Brain Candy Brief For the enterprise, dealing with cybersecurity risk is a bit of a no-win situation. It’s something they must do, but…
Every enterprise organization is in a security arms-race that they must win. As technology becomes ever-more intertwined into every business process and every element of…
I’d like to start this BrainBlog post with a horror story. Let’s say you’ve assigned a junior php developer (let’s call them Chris) to hand-code…
An Intellyx Brain Candy Update Enterprise organizations are reaching an inflection point. As they seek to digitally transform, they are facing a no-win situation. Secure…
Last week I wrote an article on illicit cryptomining – how hackers are sneaking cryptocurrency transaction processing software onto corporate networks, personal computers, and other…
An Intellyx Brain Candy Brief Insider threats may include malicious, compromised, disgruntled, or simply careless employees or other insiders. In some cases, the insider is…
非法加密货币挖矿最阴险的方面在于,受害者对此浑然不觉。专家表示,在这种新的商业模式下,攻击者不再惩罚打开附件或运行恶意脚本的受害者,而是通过劫持系统要求支付赎金。 【51CTO.com快译】非法加密货币挖矿最阴险的方面在于,受害者对此浑然不觉。思科公司Talos威胁情报部门(简称“Talos团队”)的专家们表示,在这种新的商业模式下,攻击者不再惩罚打开附件或运行恶意脚本的受害者,而是通过劫持系统要求支付赎金。现在,攻击者在积极利用被感染系统的资源进行加密货币挖矿。 … 原文标题:Top Cyberthreat Of 2018: Illicit Cryptomining,作者:Jason Bloomberg Read the entire translation at http://netsecurity.51cto.com/art/201803/567540.htm.
An Intellyx Brain Candy Brief As software vendors get wise to popular cybersecurity attacks, they harden their offerings, pushing the attackers to come up with…