Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

While the threat has infected systems around the world, a heavy concentration of attacks have registered in Germany and France, Kaspersky Lab says. [Read More]
Locky, a popular ransomware family that emerged earlier this year, has been displaying changes in its communication patterns in recent weeks, Check Point researchers say. [Read More]
A new version of the TinyPOS point-of-sale (PoS) malware has been discovered by Foregenix. [Read More]
Rokku ransomware comes with a new “feature” to make it easier for victims to pay a ransom. Victims can now use a QR code to learn details on how to send the bitcoin ransom, Avira researchers reveal. [Read More]
A file-encrypting ransomware dubbed “KimcilWare” appears to be targeting websites running Magento [Read More]
A new piece of malware is targeting embedded systems with the mission to compromise and make them part of a botnet, ESET security researchers have discovered. [Read More]
A new backdoor Trojan know as Dripion is being used in attacks against companies mainly located in Taiwan, but also against organizations in Brazil and the United States. [Read More]
A cybercriminal group has been using a custom-built point-of-sale (PoS) malware dubbed “TreasureHunt” to steal payment card data [Read More]
A new fileless ransomware family has been discovered, which abuses Windows’ PowerShell for nefarious activities, a novel approach to ransomware, Carbon Black researchers warn. [Read More]
Security researchers at Kaspersky Lab have discovered a new piece of malware that uses a PNG (Portable Network Graphics) image to hide malicious code. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Wade Williamson's picture
In the same way we have watched APT techniques trickle down from nation-state actors to more opportunistic criminals, we should expect MitB to expand from financial services to all types of applications.
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.
Marc Solomon's picture
Mosquitoes are quite similar to malware. There are thousands of species and numerous ways to try to protect against them but each method has its limitations.