- How Patched Android Chip Flaw Could Have Enabled Spying
Check Point Report Describes Flaw's Technical DetailsA severe vulnerability in a system on certain Qualcomm chips, which has been patched, potentially could have enabled attackers to remotely control Android smartphones, access users' text messages and listen in on conversations, according to a new report from Check Point Software Technologies.
- Threat Hunting Combat: The State of Analyst Evolution
- Cyber Extortion Thriving Thanks to Accellion FTA Hits
Coveware: Average Ransom Payment Hits $220,298, Presaging More Supply Chain AttacksRansomware continues to prove a reliable moneymaker for criminals, with the average cyber extortion payoff rising to $220,298, reports ransomware incident response firm Coveware. Zero-day attacks and shakedowns targeting Accellion File Transfer Appliance users helped boost criminals' profits.
- Hybrid Work Means SASE: Rethinking Traditional Network and Security Architecture
Having a VPN Isn't Enough Anymore
- Why Visibility Is Critical for Reducing Endpoint Security Complexity
See Beyond Endpoints to Stay Secure From Increasing Threats
- Analysis: REvil’s $50 Million Extortion Effort
The latest edition of the ISMG Security Report features an analysis of ransomware gang REvil’s threat to release stolen Apple device blueprints unless it receives a massive payoff. Also featured: discussions of the importance of a “shift left” strategy and efforts to secure cryptocurrencies.
- Protect the Brand: Online Fraud and Cryptocurrency Scams
Phishing, online fraud, cryptocurrency scams – they are coming at lightning speed, threatening enterprises and their brands. And just as fraudsters rely on automation to deliver these attacks, defenders can use automated tools to protect their brands. Jeff Baher of Bolster tells how.