Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Symantec researchers have discovered a Trojan that prevents users from making outgoing calls to banks from their smartphones. [Read More]
Previously, blocking C&C connections could keep Locky from encrypting files on a system, but the ransomware is now able to encrypt files without connecting to a command and control server. [Read More]
A lifetime license to use the Stampado ransomware in attacks costs $39 on the Dark Web. [Read More]
New developments in machine learning (ML), artificial intelligence (AI), and cognitive computing (CC) can play an important role in cyber security. [Read More]
The Nymaim malware has reemerged strong on the threat landscape, marking a 63% increase in attacks compared to last year. [Read More]
Accounting for a quarter of all ransomware detections over the past 30 days, Cerber is strengthening its position at the top of the threat segment, data released by Microsoft this week reveals. [Read More]
Over the past month, thousands of websites built on the WordPress and Joomla! content management systems have been compromised to redirect users to the CryptXXX ransomware. [Read More]
Wendy’s revealed that (PoS) malware infected the payment systems at more than 1,000 of its restaurants, more than three times larger than the initial number announced in May. [Read More]
NetTraveler, a Trojan that is over a decade old, was recently observed in a series of cyber-espionage attacks launched by a Chinese actor against victims in Russia and neighboring European countries, Proofpoint researchers warn. [Read More]
A new version of the Kovter ad Trojan was recently observed to pose as a Firefox update while abusing a legitimate certificate to ensure successful infection. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.