Accounting for a quarter of all ransomware detections over the past 30 days, Cerber is strengthening its position at the top of the threat segment, data released by Microsoft this week reveals. [Read More]
NetTraveler, a Trojan that is over a decade old, was recently observed in a series of cyber-espionage attacks launched by a Chinese actor against victims in Russia and neighboring European countries, Proofpoint researchers warn. [Read More]
OSX.Pirrit adware was created to reroute a Mac’s entire Internet traffic to a local proxy, to create a hidden user on the machine, to hide its installation and to prevent users from blocking the ads. [Read More]
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Although ransomware is commonly targeted at consumers, recent versions have targeted the enterprise with a vengeance. This has shifted ransomware from a nuisance to a potentially debilitating attack that can freeze critical assets and intellectual property.
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.