Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The computers of gamers in Taiwan and other Asian countries might have been infected with a piece of malware after cybercriminals managed to compromise official installers and updates for a couple of popular online games.
Australia and New Zealand are increasingly targeted with ransomware that’s designed to encrypt files and hold them for ransom, researchers at Trend Micro reported.
A worm spotted on computers in North Korea shows why the source of a cyberattack should never be determined based only on IP addresses.
Cybercrooks have been distributing a Bitcoin mining malware with the aid of a cracked version of the Andromeda bot, Fortinet researchers reported on Wednesday.
Researchers at Microsoft have spotted a new variant of the Emotet Trojan, a threat used by cybercriminals to collect banking credentials
The official website of the Internet Systems Consortium (ISC) was hacked just before Christmas and set up to serve malware to visitors, researchers at security firm Cyphort reported
North Korea called Saturday for a joint investigation with the US into a crippling cyber attack on Sony Pictures, denouncing Washington's "slandering" after President Barack Obama warned Pyongyang of retaliation.
Sony attackers used an SMB Worm Tool equipped with five components, including a Listening Implant, Lightweight Backdoor, Proxy Tool, Destructive Hard Drive Tool, and Destructive Target Cleaning Tool.
A new banking Trojan that appears to be an evolved version of the notorious Zeus has been analyzed by researchers at Kaspersky Lab.
A new financial malware designed to target the customers of South Korean banks has been spotted in the wild by researchers at Trend Micro

FEATURES, INSIGHTS // Malware

rss icon

Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Wade Williamson's picture
In the same way we have watched APT techniques trickle down from nation-state actors to more opportunistic criminals, we should expect MitB to expand from financial services to all types of applications.
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.
Marc Solomon's picture
Mosquitoes are quite similar to malware. There are thousands of species and numerous ways to try to protect against them but each method has its limitations.
Aviv Raff's picture
Without the elements of prevention, detection, and protection all working together, threat actors will always have the advantage, and will find a way to carry out their illicit economic, political or social agendas.
Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.