Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware

Nation-State Threat Actors Rely on Social Engineering First

A new report from ESET has found that most nation-state threat actors rely on spear phishing as a primary initial access technique. In the second and third quarters of 2024, state-sponsored APTs from China, Russia, Iran, and North Korea used social engineering attacks to compromise their targets. Iranian threat actors continued conducting cyber espionage against countries across the Middle East, Europe, and the US. They also expanded their targeting to hit financial companies in Africa.

The 3-2-1-1 Strategy: Protecting Your Backups Against Ransomware with NAKIVO

Following the 3-2-1-1 backup rule can ensure your Microsoft 365 data is protected and readily recoverable in any scenario, whether accidental data deletion or even ransomware encryption. Watch this short video to see how you can easily create multiple backup copies of Microsoft 365 data to comply with the 3-2-1-1 backup rule using NAKIVO Backup & Replication.

Enabling Backup Encryption with NAKIVO: A Comprehensive Guide

Encryption is widely used for security purposes because it prevents unauthorized third parties from accessing and disseminating private data. Backups are no exception and are often a target of data breaches. As part of a data protection strategy, you can implement encryption as an additional layer of security for your backups.

Is Your Social Media Growth Safe? Navigating Security Risks of Buying Followers and Likes

In today's hyper-connected world, social media platforms like Instagram and TikTok have become essential tools for personal branding, business marketing, and even social influence. With the rising importance of social media metrics such as follower counts and likes, there's been a surge in individuals and brands purchasing followers and likes to boost their online image. However, this seemingly quick way to boost social media presence comes with notable risks. When buying followers, ensuring social media security is crucial, as these practices can open doors to security vulnerabilities, account bans, and even reputational damage.

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers

This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. Retailer databases are chock-full of information that makes them highly attractive targets for ransomware gangs, as highlighted by Trustwave SpiderLabs in its recent 2024 Trustwave Risk Radar Report: Retail Sector.

Going Rogue: APT49 Using Rogue RDP | Threat SnapShot

In 2022, Microsoft began blocking macros originating from the internet in Office, pushing both pentesters and threat actors to explore new methods for initial access. Fast forward to October 2024, and APT29 is leveraging one of those methods—Rogue RDP—discovered as a workaround back in 2022. In this video, we dive into a recent spearphishing campaign uncovered by the Ukrainian CERT, where attackers used Rogue RDP to gain initial access to targets. This video will provide you practical detection opportunities that can be used to hunt for this activity in your environment.

Can Viruses Come From a PDF?

Yes, viruses can come from a PDF by hiding in malicious code. A virus is a type of malware, which is malicious software intended to infect your device and steal private data. A virus can infect your device only if you interact with it, which could happen by opening a PDF containing a virus. Since PDFs are so widely used, hackers can hide viruses within innocent-looking files to jeopardize your privacy.