Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Siggi Stefnisson

In a previous column, I wrote about how evasive malware has become commoditized and described how the techniques being used in any given piece...

Although the U.S. Congress must have designated literally thousands of commemorative days, weeks and months, I’m a bit partial to this month’s designation, National...

Rather than some technical development, I was recently intrigued by something more “social” in nature, specifically the important levels of trust so many companies...

At a recent industry conference I heard some commentary about the “disappearance” of ransomware, but I’m here to assure you that that isn’t the...

I’ve been deconstructing malware for over 20 years, and it turns out I’ve chosen a profession where it’s hard to feel in a rut...

The Necurs Botnet Has a Modular Architecture, Which Allows it to Remain Agile and Switch the Distribution TypeBased on historical patterns and recent activity,...

While "cryptojacking"— whereby a website visitors' CPU is "borrowed" to mine for cryptocurrency — has been grabbing headlines with its rapid growth, I've read...

More Articles