Security Experts:

long dotted


CRASHOVERRIDE/Industroyer, the fourth known ICS malware, was used in the Ukraine energy attacks and it’s designed to specifically target electric grids [Read More]
Recently patched Samba flaw known as EternalRed and SambaCry exploited to deliver a cryptocurrency miner [Read More]
Thousands of IP cameras have been hijacked by IoT botnets and data from Trend Micro shows that the recently launched Persirai accounts for most infections [Read More]
Trend Micro has published details on a spam campaign it detected in late May that delivers malware by using PowerPoint files and mouseover events. [Read More]
A piece of Linux malware dubbed MulDrop targets Raspberry Pi devices and abuses them for cryptocurrency mining [Read More]
Dvmap, a Trojan distributed via Google Play, is the first Android malware that injects malicious code into system runtime libraries [Read More]
Backdoor used by the Russia-linked cyberespionage group Turla obtains the address of its C&C server from comments posted to Instagram [Read More]
Cybercriminals have found a new method to deliver malware - it relies on PowerPoint files and mouseover events [Read More]
Recent malware-induced Active Directory (AD) lockouts impacting numerous organizations appear to have been caused by the Qbot banking malware, IBM security researchers warn. [Read More]
A newly discovered piece of malware managed to infect more than 250 million computers in a widespread campaign run by a Chinese digital marketing agency, Check Point researchers warn. [Read More]


rss icon

Jack Danahy's picture
The impact of ransomware has expanded from an IT nuisance to attacks that can shut down and potentially ruin the businesses they infect.
Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?