
40,000 CryptBot Downloads per Day: Bitbucket Abused as Malware Slinger
Public source code repository at Bitbucket.org was as abused to host CryptBot, Buer loader with NuclearBot and Cryptominer.
40,000 CryptBot Downloads per Day: Bitbucket Abused as Malware Slinger
Public source code repository at Bitbucket.org was as abused to host CryptBot, Buer loader with NuclearBot and Cryptominer.
Mobile Security - this path will not be easy...
Updates are essential for the security of Android devices. However, given the different operating system versions, it is difficult to keep track. We shed light on the version labyrinth and provide tips to improve security.
Mobile Security - it could be this easy...
The situation with security for smartphones using the Android operating system is improving - albeit very slowly. A major reason for this is the large variety of versions used. In a two-part series, we highlight the current problems and give tips on how to improve the security of the devices.
The story of my life : How I got into the security industry 30 years ago!
People and media are mostly looking at ransomware as a fairly recent problem. That seems to be logical if you see the rise of ransomware the past years. In fact, the problem is much older than most of us think. For this we need to go back in time to the beginning of December 1989. For some this is…
Germans dispense with security for their smartphones on holiday
G DATA survey shows that Germans are not so strict about IT security when on holiday. 43 per cent take no action regarding security for their mobile device before going away. This means no installation of security software and no password request activation. This makes life easy for local digital…
G DATA IT Security Trends 2020: Early detection and repulsion of dangerous attacks
Medium-sized companies are being targeted even more heavily by cyber criminals than before. They are often the weakest link in supply chains that include large corporations. In 2020, attackers will exploit this to an even greater extent than before and strike in a targeted manner - using new methods…
Browser manufacturers make filtering of websites more difficult: Safety suffers
Google has recently announced that it will be switching off the so-called webRequest API in the versions of Chrome it will release next year. This interface enables web content to be filtered. Microsoft has announced a similar move. Switching off the API makes effective filtering of web content…
Inside view: How DeepRay can improve conventional signatures
In order to avoid DeepRay, attackers need to keep changing their malware core to avoid detection - a complex and costly process for them. After more than six months it is time to take stock: has DeepRay proven itself in practice?
Staying one step ahead - why new technologies are needed to expose cyber attacks
It still takes an average of six months for cyber-attacks on companies to be detected. A major reason for this is the sophisticated methods used by attackers to infiltrate their targets. In this series of blogs, read why new cyber defence technologies are needed (Part 1), how graph databases are…
Shadow IT: What do NASA and medium-sized companies have in common?
Incredible, but true - an intrusion into a NASA internal network went unnoticed for almost a year. One of the reasons for this was a minicomputer that was connected to the network without the knowledge of the IT department. The events cast a bad light on JPL's security practices.