On Friday, May 12, the now infamous WannaCry ransomware burst onto the worldwide scene on its way to infecting over 200,000 systems and 150 countries in just 3 days. NHS hospitals in the UK operations ground to a halt. Petya malware followed suit this week by targeting and ransacking systems in Ukraine, Russia, and Europe before spreading to other countries.
McAfee Labs provided a good update late yesterday on the nature of the Petya ransomware and how it is "spreading like wildfire" around the globe.
McAfee Labs warns of a banking malware Pinkslipbot used to infect machines and turn them into HTTPS-based control servers.
Security researchers have spotted QakBot malware used to lockout hundreds to thousands of Active Directory (AD) accounts across a number of enterprises.
Over the weekend, the WannaCry ransomware variant cyber attack appears to be spreading across the globe as the number of victims have now surpassed 200,000 in over 150 countries.
A global cyber attack using WannaCrypt ransomware worm hit 74 countries, infecting hospitals, businesses, universities and other organizations.
The tenth edition of Verizon’s Data Breach Investigations Report (DBIR) for 2017 includes the latest data on real-world data breaches and security incidents investigated by Verizon or by one their data contributors (such as security vendors and law enforcement agencies). This year’s report also includes data specific to key industries and who targets such verticals and why.
In a recent cyber threat report, McAfee provided some good intelligence on how cybercriminals use Mirai attacks to infect poorly configured Internet of Things (IoT) devices and turn them into bots used for large scale network attacks.
The Verizon security team recently announced the first Data Breach Digest, a series of 18 cybercrime cases the team investigated. The Verizon team starts with a sneak peek of one of the case studies that describes how a university was attacked by an IoT botnet consisting of over 5,000 infected hosts. The study concludes with 12 good lessons learned from the attack.
A new malware campaign was responsible for sending 23 million emails containing Locky ransomware in just 24 hours earlier this week.