Security Experts:

long dotted


New developments in machine learning (ML), artificial intelligence (AI), and cognitive computing (CC) can play an important role in cyber security. [Read More]
The Nymaim malware has reemerged strong on the threat landscape, marking a 63% increase in attacks compared to last year. [Read More]
Accounting for a quarter of all ransomware detections over the past 30 days, Cerber is strengthening its position at the top of the threat segment, data released by Microsoft this week reveals. [Read More]
Over the past month, thousands of websites built on the WordPress and Joomla! content management systems have been compromised to redirect users to the CryptXXX ransomware. [Read More]
Wendy’s revealed that (PoS) malware infected the payment systems at more than 1,000 of its restaurants, more than three times larger than the initial number announced in May. [Read More]
NetTraveler, a Trojan that is over a decade old, was recently observed in a series of cyber-espionage attacks launched by a Chinese actor against victims in Russia and neighboring European countries, Proofpoint researchers warn. [Read More]
A new version of the Kovter ad Trojan was recently observed to pose as a Firefox update while abusing a legitimate certificate to ensure successful infection. [Read More]
A new Mac OS X piece of malware was designed to steal the content of the keychain and to establish permanent backdoor access to the infected system, ESET security researchers warn. [Read More]
Neutrino and RIG exploit kits were recently observed using a malicious Traffic Direction System (TDS) called Blackhat-TDS, researchers warn. [Read More]
OSX.Pirrit adware was created to reroute a Mac’s entire Internet traffic to a local proxy, to create a hidden user on the machine, to hide its installation and to prevent users from blocking the ads. [Read More]


rss icon

Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Bill Sweeney's picture
While the battlefield and rules of engagement have changed, the people fighting the battle against APTs remain as committed as ever.
Wade Williamson's picture
Although ransomware is commonly targeted at consumers, recent versions have targeted the enterprise with a vengeance. This has shifted ransomware from a nuisance to a potentially debilitating attack that can freeze critical assets and intellectual property.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.