Nick Lewis Nick Lewis is a former contributor to SearchSecurity. Nick Lewis’s Most Recent Content SearchSecurity What are port scan attacks and how can they be prevented? 07 Jul 2021 SearchSecurity Explore benefits and challenges of cloud penetration testing 07 Jan 2021 SearchSecurity What is bloatware? How to identify and remove it 29 Dec 2020 SearchSecurity Key SOC metrics and KPIs: How to define and use them 09 Dec 2020 SearchHRSoftware Get smarter about HR data security 11 Oct 2019 SearchCloudComputing What are the best criteria to use to evaluate cloud service providers? 09 Sep 2019 SearchSecurity What is the best way to write a cloud security policy? 26 Jun 2019 SearchCloudComputing What do the top cloud security providers offer in 2019? 26 Jun 2019 SearchSecurity What are the top cloud security certifications for 2019? 26 Jun 2019 SearchSecurity How can I detect fileless malware attacks? 21 Mar 2019 SearchSecurity How do I stop the screaming channel wireless threat? 18 Mar 2019 SearchSecurity Why do DDoS attack patterns rise in the autumn? 14 Mar 2019 SearchSecurity Understanding the new breed of command-and-control servers 01 Mar 2019 SearchSecurity How does a WordPress SEO malware injection work and how can enterprises prevent it? 25 Feb 2019 SearchSecurity Is a Mirai botnet variant targeting unpatched enterprises? 20 Feb 2019 SearchSecurity Why is the N-gram content search key for threat detection? 20 Feb 2019 SearchSecurity What new technique does the Osiris banking Trojan use? 20 Feb 2019 SearchSecurity How does the iPhone phishing scam work? 18 Feb 2019 SearchSecurity Should I use GitHub's new private repositories? 18 Feb 2019 SearchSecurity How do I stop the Vidar malvertising attack? 18 Feb 2019 SearchSecurity How do trusted app stores release and disclose patches? 15 Feb 2019 SearchSecurity How can credential stuffing attacks be detected? 14 Feb 2019 SearchSecurity How did Browser Reaper cause browsers to crash? 13 Feb 2019 SearchSecurity Should large enterprises add dark web monitoring to their security policies? 12 Feb 2019 SearchSecurity Vet third-party apps to reduce supply chain threats 12 Feb 2019 SearchSecurity How did the Python supply chain attack occur? 08 Feb 2019 SearchSecurity Is there a viable breach notification tool? 07 Feb 2019 SearchSecurity How a Windows antimalware tool helps endpoint security 29 Jan 2019 SearchSecurity What are the best ways to prevent a SIM swapping attack? 25 Jan 2019 SearchSecurity How can synthetic clicks aid a privilege escalation attack? 24 Jan 2019 SearchSecurity How does cross-site tracking increase security risks? 23 Jan 2019 SearchSecurity How can attacks bypass Windows Driver Signature Enforcement? 22 Jan 2019 SearchSecurity Man-in-the-disk attack: How are Android products affected? 21 Jan 2019 SearchSecurity How is SamSam ransomware using a manual attack process? 21 Dec 2018 SearchSecurity Ticketmaster breach: How did this card skimming attack work? 20 Dec 2018 SearchSecurity GandCrab ransomware: How does it differ from previous versions? 19 Dec 2018 SearchSecurity How to ensure your enterprise doesn't have compromised hardware 18 Dec 2018 SearchSecurity How Big Star Labs was able to use data collecting apps 18 Dec 2018 SearchSecurity Kronos banking Trojan: How does the new variant compare? 17 Dec 2018 SearchSecurity How bring-your-own-land attacks are challenging enterprises 27 Nov 2018 SearchSecurity How does Thanatos ransomware decryptor tool restore data? 16 Nov 2018 SearchSecurity How is the Trezor cryptocurrency online wallet under attack? 15 Nov 2018 SearchSecurity How does signed software help mitigate malware? 14 Nov 2018 SearchSecurity How does the Mylobot botnet differ from a typical botnet? 13 Nov 2018 SearchSecurity How does new MacOS malware target users through chat? 12 Nov 2018 SearchSecurity Enterprises should reconsider SMS-based 2FA use after breach 30 Oct 2018 SearchSecurity Removable storage devices: Why are companies banning them? 19 Oct 2018 SearchSecurity How does the resurgent VPNFilter botnet target victims? 18 Oct 2018 SearchSecurity How did the IcedID and TrickBot banking Trojans join forces? 17 Oct 2018 SearchSecurity How does the APT attack Double Kill work in Office documents? 16 Oct 2018 SearchSecurity How does the MnuBot banking Trojan use unusual C&C servers? 15 Oct 2018 SearchSecurity How does FacexWorm malware use Facebook Messenger to spread? 05 Oct 2018 SearchSecurity How is Android Accessibility Service affected by a banking Trojan? 04 Oct 2018 SearchSecurity How does stegware malware exploit steganography techniques? 04 Oct 2018 SearchSecurity How does MassMiner malware infect systems across the web? 02 Oct 2018 SearchSecurity How can GravityRAT check for antimalware sandboxes? 02 Oct 2018 SearchSecurity SamSam ransomware: How is this version different from others? 01 Oct 2018 SearchSecurity How can live chat widgets leak personal employee data? 28 Sep 2018 SearchSecurity BlackTDS: How can enterprise security teams avoid an attack? 27 Sep 2018 SearchSecurity Android Trojan: How is data being stolen from messaging apps? 26 Sep 2018 SearchSecurity Can monitoring help defend against Sanny malware update? 25 Sep 2018 SearchSecurity GoScanSSH: How does this malware work and differ from others? 24 Sep 2018 SearchSecurity How does a WDC vulnerability put hardcoded passwords at risk? 07 Sep 2018 SearchSecurity IonCube malware: Who do these malicious files put at risk? 06 Sep 2018 SearchSecurity ATM jackpotting: How does the Ploutus.D malware work? 29 Aug 2018 SearchSecurity SamSam ransomware: How can enterprises prevent an attack? 28 Aug 2018 SearchSecurity How does Google's new detection model find bad Android apps? 27 Aug 2018 SearchSecurity How is Oracle Micros POS affected by CVE 2018-2636? 17 Aug 2018 SearchSecurity What is missing from the NIST/DHS botnet security report? 16 Aug 2018 SearchSecurity Skygofree Trojan: What makes this spyware unique? 15 Aug 2018 SearchSecurity Ransomware recovery: How can enterprises operate post-attack? 14 Aug 2018 SearchSecurity Okiru malware: How does this Mirai malware variant work? 13 Aug 2018 SearchSecurity Four new Mac malware strains exposed by Malwarebytes 07 Aug 2018 SearchSecurity Trojan.AndroidOS.Loapi: What is this jack-of-all-trades malware? 20 Jul 2018 SearchSecurity Zealot campaign: How is the Apache Struts vulnerability used? 19 Jul 2018 SearchSecurity Digimine bot: How does social media influence cryptojacking? 18 Jul 2018 SearchSecurity Spider ransomware: How do ransomware attacks differ? 17 Jul 2018 SearchSecurity Android vulnerability: How can users mitigate Janus malware? 16 Jul 2018 SearchSecurity How to stop malicious browser add-ons from taking root 12 Jul 2018 SearchSecurity How does UBoatRAT use Google services and GitHub to spread? 15 Jun 2018 SearchSecurity Golden SAML: How can it abuse SAML authentication protocol? 14 Jun 2018 SearchSecurity Scarab ransomware: How do botnets alter ransomware threats? 13 Jun 2018 SearchSecurity Fake WhatsApp app: How can counterfeit apps be avoided? 12 Jun 2018 SearchSecurity AVGater vulnerability: How are antivirus products impacted? 11 Jun 2018 SearchSecurity How the Meltdown and Spectre vulnerabilities impact security 24 May 2018 SearchSecurity How does the Terror exploit kit spread through malicious ads 18 May 2018 SearchSecurity SSH private keys: How do threat actors find exposed keys? 17 May 2018 SearchSecurity How does a DDE attack exploit Microsoft Word functionality? 16 May 2018 SearchSecurity How does the KRACK vulnerability use encryption keys? 15 May 2018 SearchSecurity Bad Rabbit ransomware: How does it compare to other variants? 14 May 2018 SearchSecurity Emotet Trojan: How to defend against fileless attacks 27 Mar 2018 SearchSecurity AIR-Jumper: How can security camera lights transmit data? 16 Mar 2018 SearchSecurity Com.google.provision virus: How does it attack Android devices? 15 Mar 2018 SearchSecurity Internet Explorer bug: How does it expose address bar info? 14 Mar 2018 SearchSecurity CCleaner malware: How dangerous is it to enterprises? 13 Mar 2018 SearchSecurity ExpensiveWall malware: How does this SMS attack function? 12 Mar 2018 SearchSecurity How did OurMine hackers use DNS poisoning to attack WikiLeaks? 23 Feb 2018 SearchSecurity Typosquatting: How did threat actors access NPM libraries? 22 Feb 2018 SearchSecurity How are tech support scams using phishing emails? 21 Feb 2018 SearchSecurity GD library: How did it open the Junos OS to attacks? 20 Feb 2018 1 2