Emotet

Leverage Microsoft 365 Enhanced Security to Stay Ahead of Evolving Threats

Retrieved on: 
Tuesday, November 21, 2023

HOBOKEN, N.J., Nov. 21, 2023 /PRNewswire-PRWeb/ -- A NYC area Microsoft expert explains new AI-powered Microsoft 365 enhanced security features in a new article. The informative article first introduces Microsoft Security Copilot which combines generative AI with a security-specific model from Microsoft. The product integrates with existing Microsoft security products and soon with third-party tools.

Key Points: 
  • The informative article first introduces Microsoft Security Copilot which combines generative AI with a security-specific model from Microsoft.
  • Below are a few excerpts from the article, " Leverage Microsoft 365 Enhanced Security to Stay Ahead of Evolving Threats ."
  • "In March, Microsoft introduced Microsoft Security Copilot, which combines generative AI with a security-specific model from Microsoft.
  • The Microsoft security experts at eMazzanti Technologies help business leader with workshops on Microsoft 365 Security and Cloud Backup .

CyberMaxx Releases Third Quarter 2023 Ransomware Research Report

Retrieved on: 
Thursday, October 26, 2023

NEW YORK, Oct. 26, 2023 /PRNewswire/ -- CyberMaxx, LLC., a tech-enabled cybersecurity services company, released the third quarter 2023 edition of its Ransomware Research Report today. The cyber research team at CyberMaxx conducts routine threat research independent of client engagements to help foster collective intelligence among the cybersecurity community.

Key Points: 
  • Research finds 59% increase in attacks in Q3 vs Q2, 101% increase from Q1
    NEW YORK, Oct. 26, 2023 /PRNewswire/ -- CyberMaxx, LLC., a tech-enabled cybersecurity services company, released the third quarter 2023 edition of its Ransomware Research Report today.
  • The cyber research team at CyberMaxx conducts routine threat research independent of client engagements to help foster collective intelligence among the cybersecurity community.
  • CyberMaxx threat researchers observed a 59% increase in successful ransomware attacks in Q3 2023, compared to Q2, and a 101% increase from Q1, with a total of 1,826 attacks in Q3.
  • You can access the full report here: Ransomware Research Report

Morphisec Mentioned in Gartner® Emerging Tech: Tech Innovators in Automated Moving Target Defense Report

Retrieved on: 
Thursday, July 13, 2023

BOSTON and BEER-SHEVA, Israel, July 13, 2023 /PRNewswire-PRWeb/ -- Morphisec, the world's leading provider of prevention-first endpoint security software, today announced its recognition as a vendor in Gartner Emerging Tech: Security - Tech Innovators in Automated Moving Target Defense[1].

Key Points: 
  • BOSTON and BEER-SHEVA, Israel, July 13, 2023 /PRNewswire-PRWeb/ -- Morphisec , the world's leading provider of prevention-first endpoint security software, today announced its recognition as a vendor in Gartner Emerging Tech: Security - Tech Innovators in Automated Moving Target Defense [1].
  • Gartner states that: "Security teams are overwhelmed with having to supply reactive defense and response.
  • Coupling current endpoint security solutions together with automated moving target defense is the next evolution of cybersecurity and is a must for organizations to defend against the evolving threat landscape."
  • [1] Gartner Emerging Tech: Security — Tech Innovators in Automated Moving Target Defense, Mark Pohto, Carl Manion, 07 June 2023
    GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission.

Proofpoint’s 2023 Human Factor Report: Threat Actors Scale and Commoditize Uncommon Tools and Techniques

Retrieved on: 
Wednesday, June 14, 2023

“As security controls have slowly improved, threat actors have innovated and scaled their bypasses; once the domain of red teams, techniques like MFA bypass and telephone-oriented attack delivery, for example, are now commonplace.

Key Points: 
  • “As security controls have slowly improved, threat actors have innovated and scaled their bypasses; once the domain of red teams, techniques like MFA bypass and telephone-oriented attack delivery, for example, are now commonplace.
  • The changes set off an ongoing flurry of experimentation by threat actors to seek alternative techniques to compromise targets.
  • Threat actors began to match their ingenuity with new-found precision and patience: Conversational smishing and pig butchering threats —which start with attackers sending seemingly harmless messages—surged last year.
  • To download the 2023 Human Factor report, please visit: https://www.proofpoint.com/us/resources/threat-reports/human-factor

The Cyber-Criminals Behind Ransomware and How they Succeed

Retrieved on: 
Wednesday, June 7, 2023

HOBOKEN, N.J., June 7, 2023 /PRNewswire-PRWeb/ -- A NYC area cyber security expert explains the network of cyber-criminals behind ransomware in a new article. The informative article first cites a report by Bleeping Computer, stating that March 2023 set a record for ransomware attacks, with 459 major attacks reported worldwide.

Key Points: 
  • The author then explains the players involved in the complex ransomware crime network, including developers, distributors, affiliates, and money launderers.
  • She then reviews how the criminals behind ransomware succeed, citing the lack of adequate cybersecurity measures and awareness as a major factor.
  • Below are a few excerpts from the article, " The Cyber-Criminals Behind Ransomware and How they Succeed ."
  • These include the lack of adequate cybersecurity measures and awareness among individuals and organizations, making them vulnerable to ransomware attacks."

March 2023’s Most Wanted Malware: New Emotet Campaign Bypasses Microsoft Blocks to Distribute Malicious OneNote Files

Retrieved on: 
Monday, April 10, 2023

Last month, researchers uncovered a new malware campaign for Emotet Trojan, which rose to become the second most prevalent malware last month.

Key Points: 
  • Last month, researchers uncovered a new malware campaign for Emotet Trojan, which rose to become the second most prevalent malware last month.
  • As reported earlier this year, Emotet attackers have been exploring alternative ways to distribute malicious files since Microsoft announced they will block macros from office files .
  • In the latest campaign, the attackers have adopted a new strategy of sending spam emails containing a malicious OneNote file.
  • The attackers then use the gathered information to expand the reach of the campaign and facilitate future attacks.

Malicious Phishing Emails Increased by 569% in 2022, According to Annual Report from Cofense

Retrieved on: 
Wednesday, March 29, 2023

As observed by Cofense Intelligence, 2022 saw a 569% increase in malicious phishing emails and a 478% increase in credential phishing-related threat reports published.

Key Points: 
  • As observed by Cofense Intelligence, 2022 saw a 569% increase in malicious phishing emails and a 478% increase in credential phishing-related threat reports published.
  • These insights provide Cofense with unmatched visibility into emails bypassing SEGs and hitting users' inboxes, highlighted by a 99.996% accuracy rate on phishing threat analysis over the last year.
  • The annual report is a comprehensive assessment of the trends the Cofense team observed through this data in 2022.
  • The report highlights the top five malware families that made up the highest volume of phishing campaigns disseminated in 2022.

Cymulate Releases Findings from Over One Million Security Assessments and 1.7 Million Hours of Testing

Retrieved on: 
Tuesday, March 28, 2023

The report provides critical insights in global cybersecurity effectiveness, critical findings and top attack tactics, techniques, and procedures (TTPs).

Key Points: 
  • The report provides critical insights in global cybersecurity effectiveness, critical findings and top attack tactics, techniques, and procedures (TTPs).
  • Businesses that used scheduled and full kill-chain testing demonstrated the broadest testing coverage and the most in-depth validation when they added advanced scenario testing to their programs.
  • “Cymulate’s release of findings from over one million security assessments and 1.7 million hours of testing provides valuable insights into common weaknesses and areas for improvement in cybersecurity.
  • This data highlights the need for continuous security testing and risk assessments to stay ahead of emerging threats.”

Daily QR “Scan Scams” Phishing Users on their Mobile Devices

Retrieved on: 
Thursday, March 16, 2023

Further HP Wolf Security insights will be featured at the upcoming Amplify Partner Conference, March 28-30, McCormick Place Chicago.

Key Points: 
  • Further HP Wolf Security insights will be featured at the upcoming Amplify Partner Conference, March 28-30, McCormick Place Chicago.
  • Based on data from millions of endpoints running HP Wolf Security1, the research found:
    The rise of QR scan scams: Since October 2022, HP has seen almost daily QR code “scan scam” campaigns.
  • These scams trick users into scanning QR codes from their PCs using their mobile devices – potentially to take advantage of weaker phishing protection and detection on such devices.
  • QR codes direct users to malicious websites asking for credit and debit card details.

Akamai Research Finds Up To 16 Percent of Organizations Exhibited Signs of a Breach in 2022

Retrieved on: 
Tuesday, March 14, 2023

CAMBRIDGE, Mass., March 14, 2023 /PRNewswire/ -- Akamai Technologies, Inc. (NASDAQ: AKAM), the cloud company that powers and protects life online, today announced a new State of the Internet report that focuses on malicious Domain Name System (DNS) traffic. The report, titled, Attack Superhighway: Analyzing Malicious Traffic in DNS, finds that roughly 10-16 percent of organizations have exhibited signs of malicious command and control (C2) indicating a network breach during the past year.

Key Points: 
  • The report, titled, Attack Superhighway: Analyzing Malicious Traffic in DNS , finds that roughly 10-16 percent of organizations have exhibited signs of malicious command and control (C2) indicating a network breach during the past year.
  • Akamai observes nearly seven trillion DNS requests daily and classifies malicious DNS transactions into three main categories: malware, phishing and command and C2.
  • IABs present a large risk to organizations as their primary role is to initiate the breach and sell access to ransomware groups and other cybercriminal groups.
  • Akamai is holding a two-part webinar where we will offer a closer examination of the DNS traffic for 2022 uncovered in Attack Superhighway.