Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cybercriminals are exploiting the disappearance of a Malaysia Airlines plane by luring users to websites purporting to offer the latest news in order to steal their personal information.
Kaspersky Lab analyzes the connections between the authors of Snake and Agent.BTZ.
The National Security Agency has developed malware codenamed TURBINE that allows it to collect data automatically from millions of computers worldwide.
Dozens of computer networks in Ukraine have been infected by an aggressive new cyber weapon called Snake, according to expert analysis.
Cloud-based security solutions provider Proofpoint has launched a new offering designed to combat malvertising.
Symantec has witnessed a large uptick in attempted zero-day attacks targeting (CVE-2014-0322) that was originally used in a watering hole attack on the US Veterans of Foreign Wars’ website.
CrowdStrike's Endpoint Activity Monitoring (EAM) helps customers gain real-time insight into attacks and explore the rich Stateful Execution Inspection data collected by sensors.
A lawsuit filed on Tuesday accuses Ethiopia of infecting a US man's computer with the FinSpy spyware as part of a campaign to gather intelligence about those critical of the government.
Cylance has released CylancePROTECT, a new offering that takes a “mathematical and machine learning approach to stop the execution of malware on endpoint computers and mobile devices.”
A highly sophisticated gang of criminals inserted infected USB sticks into ATMs and emptied out all the cash inside, a security researcher told SecurityWeek.

FEATURES, INSIGHTS // Malware

rss icon

Noa Bar-Yosef's picture
Implanting Easter eggs is not only a developer’s take at humor. In fact, they could be sprinkled within the code to specifically cause a devastating effect.
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.
Marc Solomon's picture
Mosquitoes are quite similar to malware. There are thousands of species and numerous ways to try to protect against them but each method has its limitations.
Aviv Raff's picture
Without the elements of prevention, detection, and protection all working together, threat actors will always have the advantage, and will find a way to carry out their illicit economic, political or social agendas.
Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
Mark Hatton's picture
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Aviv Raff's picture
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.