Magazine Button

Latest Threats

Fraudsters spoof university email addresses in six figure supply fraud

Cybersecurity experts have joined the call for organisations to protect themselves after Action Fraud issued a warning about a new scam. The scam involves fraudsters registering domain names to look like they belong to UK university email addresses, with UK and European supply companies being defrauded out of vast sums of money as a result. […]

Sophos expert on how to identify and avoid phishing scams

Phishing might be one of the oldest tricks in the books for cybercriminals but it remains a significant threat, with sophisticated new attack methods constantly emerging. Harish Chib, Vice President, Middle East and Africa, Sophos, outlines some of the current trends and offers some advice to help businesses and organisations protect themselves against the scam. […]

Check Point expert digs into the future of cryptomining botnets

By Gadi Naveh, Threat Prevention Evangelist, Check Point The blockchain sector is now bursting with innovation, with developers looking for new, pragmatic ways to use this secure distributed ledger technology across a range of applications. And as always, cybercriminals are among the earliest adopters, and unfortunately helping to push forward public awareness of the technology. Cryptomining […]

McAfee Labs research shows cryptocurrency mining malware surge

McAfee, the device-to-cloud cybersecurity company, has released its McAfee Labs Threats Report: June 2018, examining the growth and trends of new malware, ransomware and other threats in Q1 2018. McAfee Labs saw on average five new threat samples every second, including growth in cryptojacking and other cryptocurrency mining malware, as well as notable campaigns demonstrating […]

Stay ahead of potential cyberthreats during the World Cup

Sophos, a global leader in network and endpoint security, has reminded football fans of how cybercriminals have used people’s interest in the sport to launch cyberattacks. Football has been targeted before by those who want to turn international community events into attacks. It’s a sad fact that cyberattacks often go hand in hand with major […]

Is cryptojacking replacing ransomware as the next big threat?

John Madisson, Senior Vice President – Products and Solutions at Fortinet, discusses how cryptojacking is emerging as one of the biggest cyberthreats facing global organisations and enterprises. As the threat landscape continues to become more complex and more difficult to fight, it forces security to adapt to meet the demands of automation, agility and analytics. […]

Unified defence is the best approach, expert argues

Mohammad Jamal Tabbara, Senior Systems Engineer – UAE and Channel at Infoblox, says organisations should not be fooled into thinking there is a ‘silver bullet’ for preventing cyberattacks but instead look to implement a ‘unified defence’. Enterprises of all sizes are falling victim to very determined malicious actors whose motivations range from financial gain to […]

Fraudsters target football fans looking for World Cup tickets

Kaspersky Lab experts have identified phishing emails from fraudsters offering users the chance to snap up much sought after ‘guest’ tickets to the 2018 FIFA World Cup – but at a higher price than fans bargained for. Some tickets are on offer at 10 times their original price and while the tickets are likely to […]

Variant of SynAck ransomware uses Doppelgänging technique

Kaspersky Lab researchers have discovered a new variant of the SynAck ransomware Trojan using the Doppelgänging technique to bypass anti-virus security by hiding in legitimate processes. This is the first time the Doppelgänging technique has been seen in ransomware in the wild. The developers behind SynAck also implement other tricks to evade detection and analysis […]

The tricks cybercriminals are using to hide in your phone

  Malware in the official Google store never stops appearing – it is a ‘huge victory’ for cybercriminals to sneak their malicious applications into the marketplace of genuine apps. Denise Giusto Bilić, Security Researcher at ESET, summarises some of the common behaviours of malicious Android code over the last few years. Deceit based on social […]

Browse our latest issue

Intelligent CISO

View Magazine Archive