Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers from Fox-IT have discovered that attackers are brute forcing their way into remote desktop servers to install and activate ransomware in corporate environments. [Read More]
Researchers from Intel Security discovered a piece of malware dubbed "Dynamer" that is taking advantage of a Windows Easter Egg called “God Mode” to gain persistency on an infected machine. [Read More]
Researchers at F5 Networks are warning of a new campaign of the Dridex web fraud malware targeting U.S. financial institutions. [Read More]
A new piece of Android ransomware is being delivered via a two known exploits without requiring interaction from the victims. [Read More]
Malicious insiders could use ransomware-as-a-service (RaaS) to strike targeted blows within an organization’s network and encrypt valuable data. [Read More]
Custom malware prevented Bangladesh Bank from detecting fraudulent transfers until it was too late [Read More]
Ransomware has quickly emerged to become a formidable threat to any connected business. Security teams need to be prepared to deal with this ongoing and ever-changing threat that is not likely to subside in the near future. [Read More]
The authors of a new piece of ransomware called CryptXXX decided to also pack their malware with information stealing capabilities. [Read More]
Kovter, a recently discovered piece of ransomware, represents the latest step in the evolution of a malicious program from police scareware to ad fraud Trojan and now file-encrypting malware. [Read More]
Ransomware authors are using blockchain technology to deliver decryption keys. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Bill Sweeney's picture
While the battlefield and rules of engagement have changed, the people fighting the battle against APTs remain as committed as ever.
Wade Williamson's picture
Although ransomware is commonly targeted at consumers, recent versions have targeted the enterprise with a vengeance. This has shifted ransomware from a nuisance to a potentially debilitating attack that can freeze critical assets and intellectual property.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.