Security Experts:

long dotted


A new piece of Android ransomware has emerged, capable of locking devices, changing PINs, and even fully wiping user data via factory resets, Symantec researchers warn. [Read More]
VirusTotal's malware scanning engine now supports firmware images, characterizing them as legit or malicious. [Read More]
Three banks and a pharmaceutical company in India were hit by a malicious attack recently, resulting in their networks being compromised by actors behind the “LeChiffre” ransomware. [Read More]
Developers of the recently discovered open source-based “Magic” malware are blackmailing the creator of Hidden Tear and EDA2 , so-called educational ransomware, , in order to force the developer to abandon the projects. [Read More]
The old banking Trojan URLZone, which has been known to be active in Europe, has started targeting Japan [Read More]
A new Trojan targeting Linux system has been discovered to engage into versatile malicious activity, according to researchers from security firm Dr.Web. [Read More]
CryptoWall 4.0, the latest variant of one of the most active ransomware threats, has been recently added to the Angler Exploit Kit (EK). [Read More]
TeslaCrypt, a ransomware family that emerged roughly a year ago, includes a design flaw that has already allowed security researchers build a free file decryption tool. [Read More]
The Dridex banking Trojan has been updated with a new attack methodology that leverages a similar redirection attack scheme used by the Dyre Trojan, IBM X-Force researchers warn. [Read More]
A new variant of the Tinba malware has emerged on the threat landscape, now designed to target financial entities in the Asia Pacific region, researchers at F5 Networks warn. [Read More]


rss icon

Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Bill Sweeney's picture
While the battlefield and rules of engagement have changed, the people fighting the battle against APTs remain as committed as ever.
Wade Williamson's picture
Although ransomware is commonly targeted at consumers, recent versions have targeted the enterprise with a vengeance. This has shifted ransomware from a nuisance to a potentially debilitating attack that can freeze critical assets and intellectual property.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.