logo

Information Security Managed

  • SIT Appliance
  • SIT Xternal
  • SIT Professional Services
  • icon
    • About SIT CyberSecurity
    • Some of Our Customers
    • Information Security Management
    • News
logo
Mar 2022 11 Categories: Uncategorized

Raccoon Stealer Crawls Into Telegram

The credential-stealing trash panda is using the chat app to store and update C2 addresses as crooks find creative new ways to distribute the malware.

Posted by
0
Mar 2022 10 Categories: Uncategorized

Malware Posing as Russia DDoS Tool Bites Pro-Ukraine Hackers

Be careful when downloading a tool to cyber-target Russia: It could be an infostealer wolf dressed in sheep’s clothing that grabs your cryptocurrency info instead.

Posted by
0
Mar 2022 10 Categories: Uncategorized

Most Orgs Would Take Security Bugs Over Ethical Hacking Help

A new survey suggests that security is becoming more important for enterprises, but they’re still falling back on old “security by obscurity” ways.

Posted by
0
Mar 2022 10 Categories: Uncategorized

Multi-Ransomwared Victims Have It Coming–Podcast

Let’s blame the victim. IT decision makers’ confidence about security doesn’t jibe with their concession that repeated incidents are their own fault, says ExtraHop’s Jamie Moles.

Posted by
0
Mar 2022 10 Categories: Uncategorized

Russia May Use Ransomware Payouts to Avoid Sanctions

FinCEN warns financial institutions to beware of unusual cryptocurrency payments or illegal transactions Russia may use to evade restrictions imposed due to its invasion of Ukraine.

Posted by
0
Mar 2022 10 Categories: Uncategorized

Qakbot Botnet Sprouts Fangs, Injects Malware into Email Threads

The ever-shifting, ever-more-powerful malware is now hijacking email threads to download malicious DLLs that inject password-stealing code into webpages, among other foul things.

Posted by
0
Mar 2022 10 Categories: Uncategorized

Most ServiceNow Instances Misconfigured, Exposed

Customers aren’t locking down access correctly, leading to ~70 percent of ServiceNow implementations tested by AppOmni being vulnerable to malicious data extraction.

Posted by
0
Mar 2022 10 Categories: Uncategorized

APT41 Spies Broke Into 6 US State Networks via a Livestock App

The China-affiliated state-sponsored threat actor used Log4j and zero-day bugs in the USAHerds animal-tracking software to hack into multiple government networks.

Posted by
0
Mar 2022 09 Categories: Uncategorized

Russian APTs Furiously Phish Ukraine – Google

Also on the rise: DDoS attacks against Ukrainian sites and phishing activity capitalizing on the conflict, with China’s Mustang Panda targeting Europe.

Posted by
0
Mar 2022 08 Categories: Uncategorized

The Uncertain Future of IT Automation

While IT automation is growing, big challenges remain. Chris Hass, director of information security and research at Automox, discusses how the future looks.

Posted by
0
← Newer posts 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Older posts →

Recent posts

  • Student Loan Breach Exposes 2.5M Records
  • Watering Hole Attacks Push ScanBox Keylogger
  • Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
  • Ransomware Attacks are on the Rise
  • Cybercriminals Are Selling Access to Chinese Surveillance Cameras
  • Home
  • About us
  • Blog
  • Customers
  • Information Security Management
  • News
  • Privacy Policy
  • SIT Appliance
  • SIT Professional Services
  • SIT Xternal

SIT Solutions

SIT Appliance

SIT Xternal

SIT Professional Services

More Information

About Us

Customers

Information Security Management

News

Emailsales @ sit-cybersecurity.com

SIT CyberSecurity LinkedIn

Privacy Policy

  • icon icon Facebook
  • icon icon Youtube
  • icon icon Twitter
  • icon icon Flickr
  • icon icon Rss

When you visit this site, cookies will be placed on your machine for tracking visitor activity anonymously and remembering user preferences. We set a cookie to remember that you don't want to see this infobar that warns you about cookies on this site. If you click the button to enable this, you will not see this infobar on future visits* and you will opt in to having a cookie placed on your machine by us. This site makes use of some third party services who also store cookies (Third party cookies) on your machine.

These services are:
– Google Analytics
– Google AdSense

If you would like more general information on controlling cookies, please visit www.aboutcookies.org.

*Note: cookies are browser-specific. If you visit using a different browser or on another machine, you may see the infobar again.

Enable