Security Experts:

long dotted


The newly released CryptoSearch tool allows users to find exactly what files were encrypted, and optionally move them to another location before cleaning or formatting a system. [Read More]
A college student has admitted being the developer of a widely used keylogger known as “Limitless.” He faces 10 years in prison [Read More]
A newly observed RIG exploit kit campaign leverages outdated versions of popular applications such as Flash, Internet Explorer, or Microsoft Edge to distribute the Cerber ransomware, Heimdal Security warns. [Read More]
An attack campaign using object linking and embedding (OLE) distribute an unknown keylogger disguised as a Silverlight update, hit a major financial services provider, Proofpoint researchers reveal. [Read More]
The EyePyramid malware used to spy on important people in Italy is not very sophisticated, but it still allowed attackers to steal a lot of sensitive data for a long time [Read More]
A new variant of the Ploutus ATM (automated teller machine) malware was recently observed that could be adapted to target a wide variety of ATMs. [Read More]
Spora is a new and feature-rich ransomware that allows users not only pay to recover their encrypted files, but also for immunity from future attacks. [Read More]
The RIG exploit kit (EK) managed to grab nearly 35% of the overall EK activity during the last month of 2016, retaining the leading spot in the landscape for the fourth month in a row, Symantec reports. [Read More]
The newly discovered "Terror" exploit kit packs no less than eight 8 different operational exploits in order to compromise endpoints. [Read More]
A second variant of the Shamoon 2 malware targets virtualization products, likely in an effort to make recovery more difficult and increase the impact of the attack [Read More]


rss icon

Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.