Tag: malware

Tech Time Warp
Tech Time Warp: Conficker’s persistent ability to outsmart defenses

Tech Time Warp: Conficker’s persistent ability to outsmart defenses

For the past 16 years, Conficker has been a virulent piece of malware. First identified in November 2008, it continues to persist in legacy operating systems (looking at you, Windows XP and Windows Server 2003). Take a look back in...

/ November 22, 2024
Mobile device threats: How serious are they?

Mobile device threats: How serious are they?

No matter how well a managed service provider (MSP) secures a client’s network, none of that matters if a hacker can gain access via a mobile device. According to statistics, mobile devices are an increasingly attractive target for hackers. Based...

/ July 18, 2024
credential theft
5 Ways cybercriminals are using AI: Access and credential theft

5 Ways cybercriminals are using AI: Access and credential theft

Threat actors have embraced artificial intelligence (AI) for phishing, deepfakes, malware generation, content localization, and more. This week we’re looking at how they’re using it for credential theft to gain access to high-value networks. Stolen credentials are a goldmine for cybercriminals, especially if the...

/ June 4, 2024
Killware: The emerging cyberthreat

Killware: The emerging cyberthreat

Given the surge of incidents within the past decade, many people are becoming familiar with ransomware and data breaches. However, a new type of cyberattack known as killware has emerged in recent years. It’s now a major security issue for organizations....

/ April 26, 2024
QR code phishing: What MSPs need to know to protect their customers

QR code phishing: What MSPs need to know to protect their customers

In today’s digital age, the use of technology continuously evolves to make our personal and professional lives more convenient. Quick Response (QR) code has been one such advancement. This two-dimensional barcode allows users to share website URLs and contact information...

/ April 12, 2024
How attackers weaponize generative AI through data poisoning and manipulation

How attackers weaponize generative AI through data poisoning and manipulation

The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language models (LLMs). The LLMs are trained on vast volumes of data and then use that data to create more data,...

/ April 8, 2024
Tech Time Warp
Tech Time Warp: The wicked ways of the Witty Worm

Tech Time Warp: The wicked ways of the Witty Worm

Although the goal of the Witty Worm wasn’t widespread damage—its entire target population was only 12,000 computers the world over—the malware made its presence known with a vengeance. Within 45 minutes of its first appearance at approximately 8:45 p.m. PST...

/ March 29, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: StrelaStealer malware targets organizations

Cybersecurity Threat Advisory: StrelaStealer malware targets organizations

A new email threat, StrelaStealer malware, is targeting Europe and United States organizations. It spreads through phishing emails with attachments that execute its dynamic-link library (DLL) payload designed to steal email login data. This Cybersecurity Threat Advisory reviews the threat...

/ March 27, 2024
Tech time warp
Tech Time Warp: Magistr “disembowels” computers

Tech Time Warp: Magistr “disembowels” computers

In early 2001, a nasty bug began making the rounds, hitting computer users hard with a particularly challenging payload as seen in this edition of Tech Time Warp. Magistr—sometimes called “Disemboweler” after the Swedish hacker group thought to be behind...

/ March 15, 2024
AI
Five ways cybercriminals use AI to wreak havoc

Five ways cybercriminals use AI to wreak havoc

It seems that each time there is a new technology advancement, criminals quickly cut to the front of the line when it comes to dreaming up new applications. That is the case with generative artificial intelligence (AI), which has been...

/ February 29, 2024