Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cyber espionage group with ties to Iran and Shamoon attacks targets organizations in Middle East, particularly Saudi Arabia [Read More]
IBM researchers believe Shamoon used macro-enabled documents and PowerShell scripts to infect victims [Read More]
A Remote Administration Tool (RAT) that emerged last year on hacking forums was recently observed in live attacks, Fortinet security researchers reveal. [Read More]
Russia-linked threat group APT28 (aka Pawn Storm, Fancy Bear and Sofacy) created a Mac version of its X-Agent Trojan [Read More]
A recently discovered Microsoft Office loader uses malicious macros to drop multiple malware families, Palo Alto Networks security researchers warn. [Read More]
Thousands of Android devices, including ones running Android 6 and 7, infected with Marcher trojan [Read More]
Recent attacks aimed at Polish banks are part of a bigger campaign targeting financial organizations around the world [Read More]
The beginning of 2017 has brought a series of changes on the malware charts, as the Kelihos botnet managed to climb to the top position, while the Conficker worm dropped to fourth on the list. [Read More]
A new Windows variant of Mirai is written in C++ and appears capable of performing various nefarious operations, one of which involves the spreading of the Mirai botnet to Linux-based devices. [Read More]
Hundreds of Arby’s restaurants affected by breach. Hundreds of thousands of credit and debit cards compromised [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Jack Danahy's picture
The impact of ransomware has expanded from an IT nuisance to attacks that can shut down and potentially ruin the businesses they infect.
Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.