Good news ! Hackbusters community is waiting for you !  https://discuss.hackbusters.com
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at: https://discuss.hackbusters.com.

Capitalinstall malware targets healthcare sector, delivers payload via Microsoft Azure

Istock-860611418-1

Malicious actors are using creative means to serve malware payloads via Microsoft Azure, according to a Tuesday report from security firm Netskope. These payloads are infecting targets in the security-conscious healthcare sector, as IT administrators implicitly trust the IP address blocks used by Azure for services used by their organization, or through products supplied by a third-party vendor which utilizes Azure, the report found.

Consider the following scenario: A user downloads a file hosted on Azure, and shares it to other employees by uploading it to (any arbitrary) cloud-based file storage service. Though Microsoft offers a free anti-malware service for Azure, this must be enabled by the user. Naturally, if an Azure user is using the platform to propagate malware, they will have disabled this service.

SEE: Research: The current state and predictions for the future of blockchain in the enterprise (Tech Pro Research)

The malware identified by Netskope, which it...(continued)

View All Trending Stories