A noticeable shift in the methodology for developing malware is taking place, and it can’t go unaddressed. A few years ago, attackers’ primary objective was to avoid detection — second only to making a profit. But recently, these criminals have realized a critical truth: the longer they hold an infected endpoint, the more their profit increases.
The Russian cybersecurity firm Kaspersky Labs in a blog post disclosed that they detected a new advanced persistent threat (APT) campaign that compromised system updates to install a malicious backdoor on ASUS laptops and desktops of over 1 million users in what is known as a supply chain attack.
“We’re very proud of our cyber protection team training and I think that the more of that I can get with our mission defense teams, the more successful they’ll be and then our cyber protection teams can be really focused on the high end, the big threats that we’ll run into in a peer competition and peer adversaries.”
Google is losing their minds! Why? Malicious files disguised as Google Chrome are appearing in Bing search results, and it’s not even the first time this has happened.
Here’s the story:
IBM X-Force Threat Intelligence Index 2017 The Year Of The Mega BreachExecutive Overview With Internet-shattering distributed-denial-of-service (DDoS) attacks, troves of records leaked through data breaches, and a renewed focus by organized cyber-crime on business targets, 2016 was a defining year for security. Indeed, in 2016 more than 4 billion records were leaked, more than the […]