Nick Lewis Nick Lewis is a former contributor to SearchSecurity. Nick Lewis’s Most Recent Content Search Security Explore benefits and challenges of cloud penetration testing 07 Jan 2021 Search Security What is bloatware? How to identify and remove it 29 Dec 2020 Search Security Key SOC metrics and KPIs: How to define and use them 09 Dec 2020 Search HRSoftware Get smarter about HR data security 11 Oct 2019 Search Cloud Computing What are the best criteria to use to evaluate cloud service providers? 09 Sep 2019 Search Security What is the best way to write a cloud security policy? 26 Jun 2019 Search Cloud Computing What do the top cloud security providers offer in 2019? 26 Jun 2019 Search Security What are the top cloud security certifications for 2019? 26 Jun 2019 Search Security How can I detect fileless malware attacks? 21 Mar 2019 Search Security How do I stop the screaming channel wireless threat? 18 Mar 2019 Search Security Why do DDoS attack patterns rise in the autumn? 14 Mar 2019 Search Security Understanding the new breed of command-and-control servers 01 Mar 2019 Search Security How does a WordPress SEO malware injection work and how can enterprises prevent it? 25 Feb 2019 Search Security Is a Mirai botnet variant targeting unpatched enterprises? 20 Feb 2019 Search Security Why is the N-gram content search key for threat detection? 20 Feb 2019 Search Security What new technique does the Osiris banking Trojan use? 20 Feb 2019 Search Security How does the iPhone phishing scam work? 18 Feb 2019 Search Security Should I use GitHub's new private repositories? 18 Feb 2019 Search Security How do I stop the Vidar malvertising attack? 18 Feb 2019 Search Security How do trusted app stores release and disclose patches? 15 Feb 2019 Search Security How can credential stuffing attacks be detected? 14 Feb 2019 Search Security How did Browser Reaper cause browsers to crash? 13 Feb 2019 Search Security Should large enterprises add dark web monitoring to their security policies? 12 Feb 2019 Search Security Vet third-party apps to reduce supply chain threats 12 Feb 2019 Search Security How did the Python supply chain attack occur? 08 Feb 2019 Search Security Is there a viable breach notification tool? 07 Feb 2019 Search Security How a Windows antimalware tool helps endpoint security 29 Jan 2019 Search Security What are the best ways to prevent a SIM swapping attack? 25 Jan 2019 Search Security How can synthetic clicks aid a privilege escalation attack? 24 Jan 2019 Search Security How does cross-site tracking increase security risks? 23 Jan 2019 Search Security How can attacks bypass Windows Driver Signature Enforcement? 22 Jan 2019 Search Security Man-in-the-disk attack: How are Android products affected? 21 Jan 2019 Search Security How is SamSam ransomware using a manual attack process? 21 Dec 2018 Search Security Ticketmaster breach: How did this card skimming attack work? 20 Dec 2018 Search Security GandCrab ransomware: How does it differ from previous versions? 19 Dec 2018 Search Security How Big Star Labs was able to use data collecting apps 18 Dec 2018 Search Security How to ensure your enterprise doesn't have compromised hardware 18 Dec 2018 Search Security Kronos banking Trojan: How does the new variant compare? 17 Dec 2018 Search Security How bring-your-own-land attacks are challenging enterprises 27 Nov 2018 Search Security How does Thanatos ransomware decryptor tool restore data? 16 Nov 2018 Search Security How is the Trezor cryptocurrency online wallet under attack? 15 Nov 2018 Search Security How does signed software help mitigate malware? 14 Nov 2018 Search Security How does the Mylobot botnet differ from a typical botnet? 13 Nov 2018 Search Security How does new MacOS malware target users through chat? 12 Nov 2018 Search Security Enterprises should reconsider SMS-based 2FA use after breach 30 Oct 2018 Search Security Removable storage devices: Why are companies banning them? 19 Oct 2018 Search Security How does the resurgent VPNFilter botnet target victims? 18 Oct 2018 Search Security How did the IcedID and TrickBot banking Trojans join forces? 17 Oct 2018 Search Security How does the APT attack Double Kill work in Office documents? 16 Oct 2018 Search Security How does the MnuBot banking Trojan use unusual C&C servers? 15 Oct 2018 Search Security How does FacexWorm malware use Facebook Messenger to spread? 05 Oct 2018 Search Security How is Android Accessibility Service affected by a banking Trojan? 04 Oct 2018 Search Security How does stegware malware exploit steganography techniques? 04 Oct 2018 Search Security How does MassMiner malware infect systems across the web? 02 Oct 2018 Search Security How can GravityRAT check for antimalware sandboxes? 02 Oct 2018 Search Security SamSam ransomware: How is this version different from others? 01 Oct 2018 Search Security How can live chat widgets leak personal employee data? 28 Sep 2018 Search Security BlackTDS: How can enterprise security teams avoid an attack? 27 Sep 2018 Search Security Android Trojan: How is data being stolen from messaging apps? 26 Sep 2018 Search Security Can monitoring help defend against Sanny malware update? 25 Sep 2018 Search Security GoScanSSH: How does this malware work and differ from others? 24 Sep 2018 Search Security How does a WDC vulnerability put hardcoded passwords at risk? 07 Sep 2018 Search Security IonCube malware: Who do these malicious files put at risk? 06 Sep 2018 Search Security ATM jackpotting: How does the Ploutus.D malware work? 29 Aug 2018 Search Security SamSam ransomware: How can enterprises prevent an attack? 28 Aug 2018 Search Security How does Google's new detection model find bad Android apps? 27 Aug 2018 Search Security How is Oracle Micros POS affected by CVE 2018-2636? 17 Aug 2018 Search Security What is missing from the NIST/DHS botnet security report? 16 Aug 2018 Search Security Skygofree Trojan: What makes this spyware unique? 15 Aug 2018 Search Security Ransomware recovery: How can enterprises operate post-attack? 14 Aug 2018 Search Security Okiru malware: How does this Mirai malware variant work? 13 Aug 2018 Search Security Four new Mac malware strains exposed by Malwarebytes 07 Aug 2018 Search Security Trojan.AndroidOS.Loapi: What is this jack-of-all-trades malware? 20 Jul 2018 Search Security Zealot campaign: How is the Apache Struts vulnerability used? 19 Jul 2018 Search Security Digimine bot: How does social media influence cryptojacking? 18 Jul 2018 Search Security Spider ransomware: How do ransomware attacks differ? 17 Jul 2018 Search Security Android vulnerability: How can users mitigate Janus malware? 16 Jul 2018 Search Security How to stop malicious browser add-ons from taking root 12 Jul 2018 Search Security How does UBoatRAT use Google services and GitHub to spread? 15 Jun 2018 Search Security Golden SAML: How can it abuse SAML authentication protocol? 14 Jun 2018 Search Security Scarab ransomware: How do botnets alter ransomware threats? 13 Jun 2018 Search Security Fake WhatsApp app: How can counterfeit apps be avoided? 12 Jun 2018 Search Security AVGater vulnerability: How are antivirus products impacted? 11 Jun 2018 Search Security How the Meltdown and Spectre vulnerabilities impact security 24 May 2018 Search Security How does the Terror exploit kit spread through malicious ads 18 May 2018 Search Security SSH private keys: How do threat actors find exposed keys? 17 May 2018 Search Security How does a DDE attack exploit Microsoft Word functionality? 16 May 2018 Search Security How does the KRACK vulnerability use encryption keys? 15 May 2018 Search Security Bad Rabbit ransomware: How does it compare to other variants? 14 May 2018 Search Security Emotet Trojan: How to defend against fileless attacks 27 Mar 2018 Search Security AIR-Jumper: How can security camera lights transmit data? 16 Mar 2018 Search Security Com.google.provision virus: How does it attack Android devices? 15 Mar 2018 Search Security Internet Explorer bug: How does it expose address bar info? 14 Mar 2018 Search Security CCleaner malware: How dangerous is it to enterprises? 13 Mar 2018 Search Security ExpensiveWall malware: How does this SMS attack function? 12 Mar 2018 Search Security How did OurMine hackers use DNS poisoning to attack WikiLeaks? 23 Feb 2018 Search Security Typosquatting: How did threat actors access NPM libraries? 22 Feb 2018 Search Security How are tech support scams using phishing emails? 21 Feb 2018 Search Security GD library: How did it open the Junos OS to attacks? 20 Feb 2018 Search Security Antivirus tools: Are two programs better than one? 19 Feb 2018 1 2