Reports

The Billion Dollar Headache: Sophisticated Ransomware takes aim at Small Business

The Billion Dollar Headache: Sophisticated Ransomware takes aim at Small Business

In-brief: in the latest Security Ledger podcast, Editor in Chief Paul Roberts speaks with Lior Div of the firm Cybereason and Brian NeSmith of the firm Arctic Wolf about the growing sophistication of ransomware attacks and platforms and how scammers are targeting small businesses and non-profits. 

Trend said attackers could remotely or locally tamper with control parameters on industrial robots, which lack security features found in modern IT systems.

Report warns of Robot Hacks, Tampering

In-brief: Common industrial robots are susceptible to hacks and other forms of electronic hacking that could cause physical harm to workers or result in flawed and dangerous products.

Tallinn, Estonia's Capital City

Estonia 10 Years Later: Lessons learned from the World’s First Internet War

In-brief: Gadi Evron recalls the denial of service attacks aimed at the government of Estonia in 2007 – one of the first recognized acts of ‘cyber war’ and a template for incidents that followed. Evron says there were many lessons in that incident – some of which the U.S. and its allies are still struggling to learn. 

A chart from SentinelOne shows the growth of in memory attacks, amidst declines in file-based attacks. Image courtesy of SentinelOne.

Report: we’ll know antivirus is dead when it goes quiet

In-brief: anti-virus software may go out with neither a bang nor a whimper – but utter silence. That’s if the trend towards cyber criminal actors using file-less malware continues, according to a new report. 

Program code on a monitor

Code Tutorials Spread Application Flaws Far and Wide

In-brief: Researchers at universities in Germany, working with the security firm Trend Micro, discovered more than 100 vulnerabilities in GitHub code repositories simply by looking for re-used code from tutorials and other free code samples. The same method could be harnessed by cyber criminals or other sophisticated attackers to find and exploit vulnerabilities in software applications, the researchers warned.