cyber-attack Archives – Musato Technologies
loader image

We enable business and digital transformation decisions through the delivery of cutting-edge ICT solutions and products...





Get inspired…
  
  
  

cyber-attack

Cyber Security Solutions for Businesses: Safeguarding Your Digital Assets

In today’s digital age, where businesses heavily rely on technology for their day-to-day operations, cyber threats have become a pervasive concern. The increasing number of data breaches, ransomware attacks, and other… Continue reading

What is a password manager and why do I need one?

We can’t get through the day without using passwords. So, the use of a password manager is very crucial. From logging into our social media accounts to managing our… Continue reading

The rising threat of fileless malware

Threat actors are increasing their use of fileless malware for one simple reason: most organizations aren’t prepared to detect it. Education is the first step in determining what threat these new attacks pose and what you can do to detect and stop fileless malware attacks.

Fileless Malware

Fileless malware is a significant and increasing threat. While awareness of that fact is growing, there’s still confusion among security practitioners and vendors about the nature of the threat and the requirements for a successful defense strategy.

Part of that confusion is because of most of the security methods, solutions and routines used to detect and prevent cyber security threats remain firmly grounded in addressing file-based attacks. As with any new type of cyber threat, many security-focused professionals need a point of reference, or newsworthy attack, as their driver for altering, updating or replacing their current security workflows.

The goal of every security organization is not to be the first victim of that attack.

A recent survey by Ponemon, the 2017 State of Endpoint Security Risk, showed that fileless attacks rose, as a percent of all malware attacks, from 20% in 2016 to 29% in 2017. It estimated that in 2018, fileless attacks would rise to 35%. Of the 54% of respondents that indicated they were compromised by at least one attack, 77% said those successful
breaches were from fileless attacks. Continue reading

Typically, your spam folder catches a lot of the malware-infected crud sent by the mischievous ne’er-do-wells from Email Addresses Exposedthe darker corners of the internet. Unfortunately, a newly discovered attack has targeted more than 711 million email accounts.Fortunately, only some — not all — of the targets’ passwords have been taken.

The Onliner spambot, first discovered by a Paris-based security researcher who goes by the Benkow pseudonym, was confirmed by well-regarded security expert Troy Hunt in an August 30 blog post. Hunt — a Microsoft Regional Director who runs the breach-tracking website Have I Been Pwned — referred to a data dump from Onliner as “a mind-boggling amount of data,” in which he even found his own email address. Continue reading

A massive cyber attack is hitting organizations around the world

A massive cyber attack: Victims in Ukraine, Russia, Denmark, the UK and the United States have all reported being hit by a cyber attack: authorities are investigating “global ransomware incident”.cyber attack

A number of firms around the world are reporting that they have been impacted by a major cyber attack which the UK’s cyber security agency is describing as a “global ransomware incident.”

Many of the initial reports of organizations affected came from Ukraine, including banks, energy companies, and even Kiev’s main airport. But since then more incidents have been reported across Europe, indicating the incident is affecting more organizations more widely.

The National Bank of Ukraine said it has been hit by an “unknown virus” and is having difficulty providing customer services and banking operations as a result, while Kiev’s Boryspil International Airport is also understood to be suffering from some kind of cyber attack. Even the radiation monitoring facility at the Chernobyl nuclear power Continue reading