

Kelvin Murray
Senior Threat Research Analyst /*=$expert->feature_status*/ ?>
Webroot
Comments Dotted :
10
January 28, 2021
To protect against future botnet threats, organisations should ensure they have strong, reputable cybersecurity software.
Botnets have been one of the most common malware deployment methods over the past decade, and Emotet, in particular, has been instrumental in spreading ransomware as a secondary payload, so we welcome the action taken by law enforcement agencies to knock it offline.
However, given the distributed nature of Emotet and the legal impunity that its masters have operated with for years, it is doubtful that this operation will end it entirely. However, it will make this huge criminal enterprise
.....Read More
November 19, 2020
Cybercriminals are smart, and frequently change their tactics in line with the news agenda.
We often see a rise in online scams targeting consumers and retailers in the last two months of the year, but this seems to be heightened this year amid the increase in online shopping as a result of the pandemic. Cybercriminals are smart, and frequently change their tactics in line with the news agenda. By using a household name such as Amazon, they can target a large volume of individuals in one go.
Besides Amazon, we’ve also caught a number of phishing pages selling the iPhone Pro 11......Read More

September 22, 2020
Users need to be aware of where valuable data might lie.
With the increased use of social tools to 'post' about personal life and business communications, social media security is more important than ever. Everyone needs to be cautious about how much personal information they share, and this is an example of there being more information in a photo than might meet the eye. In this case, what was posted was used to access personal details and accounts though the booking reference that was in the image.
In order to limit the impact of these types of.....Read More

July 23, 2020
Security awareness training should be implemented for staff and students from day one, ensuring that they are vigilant in scrutinising.
Educational organisations continue to be targeted for cyberattacks. Unfortunately, the sprawling nature of a university – with all their separate faculties and facilities – and the inevitable movement of data between departments makes IT administration and security challenging to implement and maintain. Additionally, universities contain a wealth of valuable intellectual property which can be valuable to hackers, especially those acting on behalf of governments.
To mitigate future attacks, .....Read More

July 21, 2020
With apps such as these, uptake will be based on trust.
Given the urgency in rolling out the test and trace programme, it is clearly challenging to balance the importance of public data privacy with the need to track the epidemic accurately to keep people medically safe. This was always going to be difficult given the timeframe, but privacy and security still need to be front of mind when dealing with any personal data.
This is especially important with healthcare data, which is at particular risk of cyber-attacks and data breaches as information.....Read More

June 12, 2020
Companies who hold private information should also ensure they have clearly defined security policies.
Anyone who develops an app that handles sensitive customer data should ask themselves two important questions – is it secure and is it really necessary? We’re seeing that breaches such as these are all too common and anyone looking to save time and money by moving to a digital system should take risks such as these into consideration.
Companies who hold private information should also ensure they have clearly defined security policies and procedures to avoid the leak of information. This.....Read More

May 14, 2020
The biggest concern here is the use of stolen data as a means to enable further attacks.
Unfortunately, health and education sectors are common targets for cybercriminals throughout Covid-19. The inherent weakness in their cybersecurity is one factor, but the value in their data is another. In this case, hospital data can be used in insurance fraud, drug prescription forgery, extortion or as a means to enable future attacks on the service or the individual victims. The sheer size and scope of the healthcare industry and the fact that the public sector uses many contractors and.....Read More

May 13, 2020
The move by attackers to try and steal data is one of the surging trends in ransomware.
The move by attackers to try and steal data is one of the surging trends in ransomware. It can be done automatically by malware, or by hackers who have specifically targeted a network through several different means. Sadly, this has become the criminal norm and targeted hacks, often aimed at SMBs, governments, healthcare, transport and industry networks, are common. Criminals running campaigns using Maze ransomware, often attempt to steal data before deploying malicious encryption gives them.....Read More

May 07, 2020
COVID-19 will not stop hackers, but now is a good time for all organisations to review their incident plans and to update them as needed.
An increase in attacks targeting healthcare organisations suggests that hospitals are definitely one of the top targets for cyber-attacks at the moment. Clearly, COVID-19 is allowing cybercriminals to gain a higher rate of return by targeting healthcare providers because they firmly believe that organisations will pay their way out of an attack when under high-pressure factors.
As the services that medical facilities provide are essential and often cannot be disrupted without severe risk to.....Read More

April 17, 2020
Senior leaders within EDP will currently be working out the the potential impact of the release of their confidential data.
This tactic of holding the confidentiality of the corporate data itself to ransom is still relatively new, and the energy sector has been a particular target of “big game” ransomware cybercriminals in the last year.
Ransomware criminals look for the most essential services to lock-up as paying a ransom might be considered the safer option than facing the consequences of lost power for millions of people for an indefinite period. These gangs are highly organized and they select their.....Read More
