New Flame Stealer Malware: A Persistent Threat to Credit Card Security
| | |

New Flame Stealer Malware: A Persistent Threat to Credit Card Security

A new malware named “Flame Stealer” has emerged as a significant threat to the security of credit card data, particularly for users of popular platforms such as Discord, Spotify, Instagram, TikTok, and Roblox. This sophisticated malware exhibits the following features and implications: The malware also collects information about browser extensions, Discord accounts, connections, bots, and…

The CDK Global Ransomware Attack: A Case Study in Supply Chain Disruption and Security Preparedness
|

The CDK Global Ransomware Attack: A Case Study in Supply Chain Disruption and Security Preparedness

In June 2024, a ransomware attack targeting CDK Global, a major provider of dealership management software (DMS), sent shockwaves through the American automotive industry. The attack crippled the operations of approximately 15,000 car dealerships across the US, highlighting the critical role of technology in modern supply chains and the devastating consequences of cyberattacks. Immediate Impact…

| |

Cryptojacking Soars as Cyberattacks Increase, Diversify

Digital threat actors are adopting evolving tactical behaviors, opting for different types of malicious attacks compared to previous years, according to SonicWall. Overall intrusion attempts were up, led by the highest year on record for global cryptojacking volume recorded by SonicWall, as threat actors shifted away from traditional ransomware attacks in favor of a stealthier…

| |

Mobile Apps: How to Use Them Safely

The use of mobile applications (apps) is increasing in parallel with the increased use in mobile devices. According to Gartner, “Worldwide mobile application store revenue is projected to surpass $15.1 billion in 2011… and by 2014 over 185 billion applications will have been downloaded from mobile app stores.” The continued growth of mobile apps requires…

| | |

Staying Safe On Social Networking Sites

From the Desk of Chad M. Barr, CISSP, CISA The popularity of social networking sites — such as MySpace, Facebook, Twitter and others — has expanded tremendously in recent years, with nearly two-thirds of Americans using these sites regularly. The number of adult Internet users having a social networking profile has more than quadrupled in…

| | | |

Cyber Security Emerging Trends and Threats for 2012

During 2011, cyber security incidents included theft of intellectual property and government data, hacktivism, malware targeting mobile devices and a resurgence of the Zeus Trojan, which targets financial information. Protecting against these attacks was a key challenge for organizations of all sizes in both the public and private sectors. What is in store for 2012?…