10Fold- Security Never Sleeps- 172

Average Global Cost of a Data Breach Now $3.6M, IBM Reports

“Cost of breaches surprisingly low”

The Ponemon Cost of Data Breach report has historically shown consistently increasing costs of attacks, but the IBM sponsored 2017 edition has shown a deviation from the usual trend. Wendi Whitmore, global lead of IBM X-Force IRIS told eWEEK; “Overall when you look at the report, the good news is that the overall cost of a data breach is down.”

IOT Malware Activity Already More Than Doubled 2016 Numbers

“Doubling of last years malware attacks already”

Honeypots formulated by Kaspersky Labs that mimicked IoT devices attracted over 7,200 malware samples over the course of May. These attacks were attempting to infect IoT connected devices primarily over telnet and SSH. This was a concerning rise, as only 3,200 samples were detected last year.

New report reveals how malware uses evasion to hide in plain sight

“Secrets hidden right in front of you”

The digital world seems to have been hiding malware in plain sight. In McAfee Labs Quarterly Threat Report, researchers have found that simple evasion techniques are used to disguise and distribute malware.

TrickBot Targets Payment Processors, CRM Providers

“CRMsystems also being targeted”

The TrickBot banking Trojan is no longer limiting its targets to financial institutions. Payment processing systems, such as CRM programs, are seeing there systems attacked F5 has warned. Earlier this year TrickBot was spotted hitting firms across the world in largely financial markets, now researchers fear that theprogram has evolved its preferences again and will further expand its reach.

Cisco Releases Open Source Malware Signature Generator

“Talos intelligence group announces open source framework to track malware”

Cisco’s Talos research group has announced Monday that its new tool, BASS, is capable of generating antivirus signatures from malware, essentially an automatic signature synthesizer. The framework creates unique signatures from malicious software that stems from the previously generated clusters. Cisco hopesthat this tool will make malware analysis simpler and improve resource allocation.