Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/14 FireEye gears up email security for emerging threats Business email compromise (BEC), which is often cited as the most common way for cyber criminals to infiltrate corporate networks, is a type of scam that targets email accounts of high-level employees related to finance or working with wire transfer payments, either spoofing or compromising them through keyloggers or phishing attacks. http://bit.ly/2M9Dm5V Cryptocurrency mining malware is the number one malware menace – again Crypto... read more.

  • January 18, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/14 FireEye gears up email security for emerging threats Business email compromise (BEC), which is often cited as the most common way for cyber criminals to infiltrate corporate networks, is a type of scam that targets email accounts of high-level employees related to finance or working with wire transfer payments, either spoofing or compromising them through keyloggers or phishing attacks. http://bit.ly/2M9Dm5V Cryptocurrency mining malware is the number one malware menace – again Crypto... read more.

  • January 18, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/7 Ursnif, Emotet, Dridex and BitPaymer Malware Families Team Up to Wreak Havoc Given the impact of the Ursnif and Dridex banking Trojans, the ubiquity of Emotet loaders, and the ability of BitPaymer to infiltrate systems via remote desktop and email vectors, this malware interoperability provides evidence that malicious actors are developing their own versions of professional organizations to empower threat evolution. https://ibm.co/2FddCVU Security researchers find over a dozen iPhone apps lin... read more.

  • January 11, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/7 Ursnif, Emotet, Dridex and BitPaymer Malware Families Team Up to Wreak Havoc Given the impact of the Ursnif and Dridex banking Trojans, the ubiquity of Emotet loaders, and the ability of BitPaymer to infiltrate systems via remote desktop and email vectors, this malware interoperability provides evidence that malicious actors are developing their own versions of professional organizations to empower threat evolution. https://ibm.co/2FddCVU Security researchers find over a dozen iPhone apps lin... read more.

  • January 11, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/17 Symantec Collaborates with Aon to Address Hacking Concerns As incidences of high-profile cybercrimes and cyber warfare continue to grow, demand for stronger cyber security solutions and products are becoming vital for businesses and individuals alike. To address this growing concern, Symantec is taking initiatives to enhance its products.  http://bit.ly/2ECLnzs Microsoft wants AI to predict if your Windows PCs will get malware Microsoft has launched a new $25,000 malware challenge for... read more.

  • December 21, 2018

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/17 Symantec Collaborates with Aon to Address Hacking Concerns As incidences of high-profile cybercrimes and cyber warfare continue to grow, demand for stronger cyber security solutions and products are becoming vital for businesses and individuals alike. To address this growing concern, Symantec is taking initiatives to enhance its products.  http://bit.ly/2ECLnzs Microsoft wants AI to predict if your Windows PCs will get malware Microsoft has launched a new $25,000 malware challenge for... read more.

  • December 21, 2018

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/10 ESET discovers 21 new Linux malware families In a report published yesterday by cyber-security firm ESET, the company details 21 "new" Linux malware families. All operate in the same manner, as trojanized versions of the OpenSSH client. https://zd.net/2C0PsLp Fileless malware surge, warns Malwarebytes report These attacks and compromises are growing in sophistication and frequency, and are proving to be particularly successful against businesses because the majority of past security soluti... read more.

  • December 14, 2018

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/10 ESET discovers 21 new Linux malware families In a report published yesterday by cyber-security firm ESET, the company details 21 "new" Linux malware families. All operate in the same manner, as trojanized versions of the OpenSSH client. https://zd.net/2C0PsLp Fileless malware surge, warns Malwarebytes report These attacks and compromises are growing in sophistication and frequency, and are proving to be particularly successful against businesses because the majority of past security soluti... read more.

  • December 14, 2018

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/3 McAfee Labs 2019 Threats Predictions Report We have witnessed greater collaboration among cybercriminals exploiting the underground market, which has allowed them to develop efficiencies in their products. Cybercriminals have been partnering in this way for years; in 2019 this market economy will only expand. The game of cat and mouse the security industry plays with ransomware developers will escalate, and the industry will need to respond more quickly and effectively than ever before. http:... read more.

  • December 10, 2018

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/3 McAfee Labs 2019 Threats Predictions Report We have witnessed greater collaboration among cybercriminals exploiting the underground market, which has allowed them to develop efficiencies in their products. Cybercriminals have been partnering in this way for years; in 2019 this market economy will only expand. The game of cat and mouse the security industry plays with ransomware developers will escalate, and the industry will need to respond more quickly and effectively than ever before. http:... read more.

  • December 10, 2018