Tag: malware

Tech Time Warp
Tech Time Warp: The wicked ways of the Witty Worm

Tech Time Warp: The wicked ways of the Witty Worm

Although the goal of the Witty Worm wasn’t widespread damage—its entire target population was only 12,000 computers the world over—the malware made its presence known with a vengeance. Within 45 minutes of its first appearance at approximately 8:45 p.m. PST...

/ March 29, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: StrelaStealer malware targets organizations

Cybersecurity Threat Advisory: StrelaStealer malware targets organizations

A new email threat, StrelaStealer malware, is targeting Europe and United States organizations. It spreads through phishing emails with attachments that execute its dynamic-link library (DLL) payload designed to steal email login data. This Cybersecurity Threat Advisory reviews the threat...

/ March 27, 2024
Tech time warp
Tech Time Warp: Magistr “disembowels” computers

Tech Time Warp: Magistr “disembowels” computers

In early 2001, a nasty bug began making the rounds, hitting computer users hard with a particularly challenging payload as seen in this edition of Tech Time Warp. Magistr—sometimes called “Disemboweler” after the Swedish hacker group thought to be behind...

/ March 15, 2024
AI
Five ways cybercriminals use AI to wreak havoc

Five ways cybercriminals use AI to wreak havoc

It seems that each time there is a new technology advancement, criminals quickly cut to the front of the line when it comes to dreaming up new applications. That is the case with generative artificial intelligence (AI), which has been...

/ February 29, 2024
cybersecurity
MSPs have an opportunity to change the cybersecurity game

MSPs have an opportunity to change the cybersecurity game

For as long as anyone can remember, cybersecurity has been a game of whac-a-mole where resources are hopefully marshaled in time to thwart a threat either before damage is inflicted or, at the very least, as quickly as possible once...

/ February 26, 2024
XDR Threats
XDR round-up 2023: High-severity threats on the rise, peak during holidays

XDR round-up 2023: High-severity threats on the rise, peak during holidays

In 2023, Barracuda XDR, including its team of SOC analysts on 24-hour watch, cut through nearly two trillion (1,640 billion) IT events to isolate tens of thousands of potentially high-risk security threats. Security researchers have analyzed the most prevalent XDR detections...

/ February 21, 2024 / 14 Comments
Swifties can pose cyber risks

Swifties can pose cyber risks

If you are like me, the whole Taylor Swift-Travis Kelce romance isn’t keeping you up at night. Taylor Swift can be an economic boom to cities where she tours, but she can also be an unintentional cyber risk to her legions...

/ December 8, 2023
Scattered Spider spins a troublesome web

Scattered Spider spins a troublesome web

The Itsy-Bitsy Spider may have crawled up the waterspout, but the Scattered Spider could be crawling into your email box. CISA is sounding the alarm about Scattered Spider and the havoc it can wreak. The CISA bulletin says: “Scattered Spider...

/ November 30, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: ‘LittleDrifter’ extends its reach

Cybersecurity Threat Advisory: ‘LittleDrifter’ extends its reach

This Cybersecurity Threat Advisory sheds light on a recently discovered USB worm identified as “LittleDrifter” has been attributed to the Russia-linked hacker group known as Gamaredon. The worm has spread beyond its presumed intended target, Ukraine, to other countries including...

/ November 28, 2023
Tech Time Warp
Tech Time Warp: Origins of the term “computer virus”

Tech Time Warp: Origins of the term “computer virus”

Now, nearly four years since the word “coronavirus” entered the popular lexicon, who doesn’t feel like an amateur epidemiologist? Given world events, it should be easy to understand why Leonard Adleman—the “A” of the RSA algorithm—was inspired by the graduate...

/ November 17, 2023