Security Experts:

long dotted


A recently observed piece of mobile malware called "Godless" leverages multiple rooting exploits and targets nearly 90 percent of Android devices. [Read More]
HTML5 will not prevent malvertising. This has nothing to do with HTML5 per se, but is down to the nature of the adverts themselves. [Read More]
Seven years after it emerged, the Confiker worm is the most prominent malware family. [Read More]
Over the past two months, Cerber ransomware campaigns have focused mainly on three geographies: the United States, Turkey, and the United Kingdom. [Read More]
Malware authors have been long using JavaScript to distribute their malicious applications, but none of them has created a piece of ransomware using exclusively JavaScript until now. [Read More]
Malware authors are switching from macros to object linking and embedding (OLE) to hide malicious Visual Basic and JavaScript scripts in Office documents, Microsoft warns. [Read More]
The PhotoMiner worm spreads through infecting websites that are hosted on FTP servers, and brings its authors money by mining for the Monero crypto-currency. [Read More]
The leaked source code of the Carberp Trojan has spawned numerous malware variations, including Bolek, a polymorphic file malware showing increased sophistication. [Read More]
Malicious email campaigns spreading the Dridex banking Trojan and the Locky ransomware have been inactive for over a week after the Necurs botnet experienced an outage. [Read More]
The developers of SNSLocker ransomware included credentials to access to their server in the ransomware’s code and forgot to remove them before beginning their infection campaign. [Read More]


rss icon

Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.