Read some of the most interesting and useful infosec articles we came across during the first half of October 2018. We have included an article on what to do after a breach because the majority of us will, unfortunately, need this information at some point. Also, learn about malicious code can that be used to create a cryptominer, about the GPlayed trojan that poses as Google Play and more.
For more articles, check out our #onpatrol4malware blog.
Source: ITSP Magazine
With attacks occurring every 39 seconds, everyone gets breached sooner or later. Even organizations that have seemingly robust cyber security solutions in place aren’t immune. Learn about steps you can put in place to mitigate the damage. Read more.
GPlayed may be the new face of malware — flexible and adaptable, with a Swiss Army knife-like toolbox that can be used to target pretty much anyone. Read more.
Source IBM Security Intelligence
Cisco Talos has identified the latest attempt to penetrate mobile devices — a new Android trojan that we have dubbed “GPlayed.” This is an extremely flexible trojan, making it a very effective tool for malicious actors. Read more.