e92plus Blog

EDR for Everyone

Nov 10, 2017, 09:10 AM Ben Gane

We’ve all seen the headlines. Big name breaches. Confidential company and customer data exfiltrated. Highly sophisticated attacks, sometimes even nation-state sponsored - these are the crème de la crème of malware...


Read More

Toast Overlay Weaponized to Install Several Android Malware

Nov 10, 2017, 09:03 AM Ben Gane

We uncovered new Android malware that can surreptitiously install other malware on the affected device via the Toast Overlay attack: TOASTAMIGO, detected by Trend Micro as ANDROIDOS_TOASTAMIGO. The malicious apps, one of which had over 500,000 installs as...


Read More

Cybercriminal Undergrounds: Social and Economic Philosophies

Nov 10, 2017, 08:55 AM Ben Gane

When you think of a hacker, what's the first thing that comes to mind? It might be a lone person typing away in a dark room, an image commonly represented in movies and television. However, the world of cybercrime is much more sophisticated than this. Attackers are forming groups...


Read More

The Ivanti Threat Thursday Update for November 9, 2017: Malware Evolves

Nov 10, 2017, 08:49 AM Ben Gane

Greetings. Hackers fine-tune ransomware and other malware to make their attacks more effective and disruptive. You doubtless have opinions, reactions, and perhaps even suggestions. All are welcome – so please share. Thanks in advance.


Read More

Tricking Web Apps into Running Malicious Code

Nov 9, 2017, 09:30 AM Ben Gane

Whenever you’re online, you connect to a server that responds to your requests. Depending on the defenses, the web application you use may be vulnerable to injection types of attacks. Among the most prominent are XSS and SQL injection; another one is known as HTTP response splitting...


Read More

IoT taps into rural America, senators concerned about security

Nov 9, 2017, 09:28 AM Ben Gane

During a hearing this Tuesday Nov. 7, US senators discussed the importance and even possible implementation of IoT technology in rural areas of the United States, although connectivity is still an important issue they have to solve...


Read More

Why do people cover their webcams? Should you too?

Nov 8, 2017, 14:13 PM Ben Gane

Last year you will undoubtedly have seen a photo of Mark Zuckerberg, with his computer in the background displaying a piece of tape covering his built-in webcam. This led to mild pandemonium whilst the listening public scrambled to copy him, because if he's doing it, it must be something to...


Read More

Forcepoint Security Predictions 2017 - How did we do?

Nov 8, 2017, 10:40 AM Ben Gane

Every year, Forcepoint makes security predictions for the 12 months ahead. Here, we review how well we did in our 2017 Predictions Report, released in November of 2016...


Read More

REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography

Nov 8, 2017, 09:04 AM Ben Gane

REDBALDKNIGHT, also known as BRONZE BUTLER and Tick, is a cyberespionage group known to target Japanese organizations such as government agencies (including defense) as well as those in biotechnology, electronics manufacturing, and industrial chemistry. Their...


Read More

Forcepoint NGFW excels in security. Yet again.

Nov 8, 2017, 08:57 AM Ben Gane

Forcepoint’s mission is to help people rethink cybersecurity – to take a new approach that is far more secure, efficient and resilient for today’s rapidly shifting world. This was the founding principle of our next generation firewall, and today we’re pleased to announce yet more proof...


Read More
Back
to Top