Cloud Security News: Week in Review is our blog series, grabbing the more interesting cloud security scoops from the web. Sit back, relax, and catch up on all you should know about this week.
Watch out everyone, there’s a brand new type of malware in town that is, wait for it… File-less. No, this is not a joke. Were you among the thousands of people that attended the RSA security conference this week? If you didn’t get to attend, check out the article below summarizing the top seven security threats discussed during one of the sessions. Another topic covered at RSA: the DMARC protocol. Watch the video below to learn more about its importance when it comes to protecting your inbox.
By Ali Raza
New research indicates that hackers are now attacking via file-less malware, establishing a new type of cyberthreat that is growing increasingly popular as of late. What is file-less malware and how does it infect your system, you may ask? Essentially this malware “does not depend on the files on the hard drive of a device for its survival,” so it is able to remain undetected while hiding inside the victim’s computer system. This article goes into more detail and summarizes a step-by-step process hackers follow when initiating file-less malware attacks.
By Mark Hachman (@markhachman)
During the RSA security conference in San Francisco this week, SANS Institute ran a session discussing what they identified as seven of the most dangerous attack vectors in today’s security landscape. To no one’s surprise, the top contender on the list was ransomware, which of course has been around for over 20 years now, but nonetheless takes the cake. Coming in second was the Internet of Things (IoT), which opens a whole new world of potential threats, as consumers continue to use an increasing number of smart devices that are easy targets for cyberattacks.
85% of consumer inboxes are protected by DMARC, a protocol that prevents the spoofing of email. Sounds good, right? In theory, yes. However, only about 15% of corporate senders surveyed at RSA use the protocol. The risks are there; if you don’t use it properly, you can prevent emails from being delivered, which is why careful implementation is needed. Watch this video as Philip Reitinger, president and CEO of the Global Cyber Alliance, shares findings from the GCA survey on the use of the DMARC protocol.