Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cybercriminals using Ransomware in attacks appear to be leveraging infected machines for additional nefarious purposes, such as launching distributed denial of service (DDoS) attacks, researchers at Invincea warn. [Read More]
The "Suckfly group" has launched attacks against government and commercial organizations in numerous countries, but the primary targets appear to be individuals and organizations located in India. [Read More]
Macro malware has recently returned to focus and is evolving, courtesy of tricks designed to better keep the malicious code hidden, Microsoft warns. [Read More]
Newly observed "Furtim" malware goes through great lengths to avoid being caught by security parties: it includes checks for 400 security products. [Read More]
Hackers once again took a swing at the Locky distribution network and replaced the malicious payload with a benign file, researchers at F-Secure report. [Read More]
Researchers find new and improved version of Skimer, a malware that allows cybercrooks to steal money from ATMs [Read More]
Auburn, Indiana-based DeKalb Health recently experienced a temporary disruption in the operation of its administrative computer system due to a ransomware attack. [Read More]
Petya, a piece of malware observed in late March to encrypt the entire hard drive of the infected computers, has received an update and is now dropping a second ransomware, researchers warn. [Read More]
An Android banking Trojan discovered a couple of years ago has become a global threat in the past months, after being updated with ransomware capabilities, Doctor Web security researchers warn. [Read More]
The malware used in the Bangladesh Central Bank theft and an unnamed bank in Vietnam could be be linked to other cyberattacks, including the massive attack against Sony Pictures in 2014. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Bill Sweeney's picture
While the battlefield and rules of engagement have changed, the people fighting the battle against APTs remain as committed as ever.