Remove 2020 Remove Infrastructure Remove Malware
article thumbnail

Top 10 Cybersecurity Threats in 2020

Kaseya

Just like the coronavirus spreads from person to person, cybersecurity malware too can spread rapidly from computer to computer and network to network. Here are the top 10 cybersecurity threats businesses face in 2020: Phishing Attacks. Misconfiguration will drive a majority of the incidents according to the Sophos 2020 Threat Report.

Malware 136
article thumbnail

Sysrv-Hello Expands Infrastructure

Lacework

Sysrv-hello is a multi-architecture Cryptojacking (T1496) botnet that first emerged in late 2020, and employs Golang malware compiled into both Linux and Windows payloads. The malware is equal parts XMRig cryptominer and aggressive botnet-propagator. The post Sysrv-Hello Expands Infrastructure appeared first on Lacework.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Menlo Security announces $100M Series E on $800M valuation

TechCrunch

Menlo Security , a malware and phishing prevention startup, announced a $100 million Series E today on an $800 million valuation. “When they click a link or engage with a website, the safe visuals are guaranteed to be malware-free, no matter where you go or you end up,” Ben-Efraim said.

Malware 187
article thumbnail

Ketch raises another $20M as demand grows for its privacy data control platform

TechCrunch

In 2020, Ketch introduced its data control platform for programmatic privacy, governance and security. There is also a matter of security, with much effort going into ransomware and malware, but Chavez feels a big opportunity is to bring security to the data wherever it lies.

Data 239
article thumbnail

Solorigate: SolarWinds Orion Platform Contained a Backdoor Since March 2020 (SUNBURST)

Tenable

Dustin Volz (@dnvolz) December 13, 2020. Kim Zetter (@KimZetter) December 14, 2020. New Blog from us at FireEye: Writeup of UNC2452, a highly sophisticated attacker who distributed malware via a software supply chain attack. Ben Read (@bread08) December 14, 2020. March 2020 through June 2020. Release Date.

Security 122
article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This ancient technique has found its place in the world of malware, namely hiding malicious code within other files including image formatted files ( T1027.003 ). General indicators and signatures for steg malware are provided in the hunting section. Steg malware is uncommon relative to other malware. Malware Details.

Malware 96
article thumbnail

Extra Crunch roundup: ‘Nightmare’ security breach, Poshmark’s IPO, crypto boom, more

TechCrunch

How did fashion marketplace Poshmark go from posting regular losses in 2019 to generating net income in 2020? CoinMarketCap reports that crypto market values have reached almost $659 billion; that figure was just $140 billion in March 2020. 2020 was a disaster, but the pandemic put security in the spotlight.

Retail 263