Do you remember the Key Re-installation Attack or “KRACK attack” news from 2017? Most of us will never forget. When one researcher uncovered a number of vulnerabilities present in WPA2’s 4-way handshake, the world was shocked to realize that such a trusted standard’s encryption could be defeated so easily. In response, the Wi-Fi industry rallied together to develop an improved … [Read more...]
The 6 Threats Every Wi-Fi System Should Be Able to Prevent
Wi-Fi has become an integral part of everyday business and life in general, yet Wi-Fi security still doesn’t receive as much attention or investment as it should. According to Wi-Fi NOW, nearly 75 percent of US smartphone traffic runs over Wi-Fi, as of Q4 2018. This spells a significant amount of opportunity for bad guys looking to attack unsuspecting users over under-secured … [Read more...]
Mario Malware – Security Byte
Researchers at Bromium have discovered an interesting new malware campaign specifically targeting Italy. Attackers are spamming malicious Excel documents to Italian victims. If you open the malicious Excel document, it leverages Powershell to filelessly begin the infection, but ultimately downloads and executes the Grandcrab family of ransomware. Ironically, the malicious Excel … [Read more...]
Vaporworms – The Top Threat of 2019?
Anyone that’s been paying attention knows that fileless malware has been on the rise for the past few years. But, did you know that we’re likely to see this infamous threat transform in new and menacing ways this year? Enter the Vaporworm. Just a few short months ago, the WatchGuard Threat Lab predicted that 2019 would be the year we’d see a new breed of fileless malware with … [Read more...]
Artificial Intelligence: An Essential Layer of Security for Businesses of All Sizes
Cyber attacks occur in the blink of an eye. A single point of infection can spread like wildfire from endpoint to endpoint; location to location; and business to business. Traditional approaches to protection rely heavily on manual processes and preestablished policies to block attacks that fail to keep up with the ever-evolving nature of threats. Parsing through huge … [Read more...]