Security Experts:

long dotted


The Kovter Trojan family was responsible for a significant increase in new malware variants in October, a recent report from Symantec reveals. [Read More]
Operators behind the Locky ransomware are impersonating the US Office of Personnel Management in a new distribution campaign. [Read More]
RiskIQ, which helps detect digital threats stemming from areas such as the Web, malvertising and social media, has closed $30.5 in a Series C funding round led by Georgian Partners. [Read More]
Madison County, Indiana, was the victim of ransomware last week. According to Madison County Commissioner John Richwine, it followed the directions of its insurance carrier in how to respond to the attack. [Read More]
A file-encrypting ransomware that targets users in Russia, dubbed Telecrypt, abuses the instant messaging service Telegram [Read More]
Potentially Unwanted Programs (PUPs) or Applications: How do you tell the good apps from the bad apps? How do you get that whitelist of good apps that allows you to block everything else? [Read More]
The Mirai botnet used in the recent massive distributed denial of service (DDoS) attacks has ensnared Internet of Things (IoT) devices in 164 countries, researchers say. [Read More]
Free Voice-over-IP (VoIP) service Discord has had its servers abused to host and distribute remote access Trojans (RATs), Symantec warns. [Read More]
A newly observed Linux backdoor Trojan can perform its nefarious activities without root access, by using the privileges of the current user, Doctor Web security researchers have discovered. [Read More]
The Sarvdap spambot has been checking the IP addresses of infected hosts against common blacklists, in an attempt to ensure that its spam email is successfully delivered, Palo Alto Networks security researchers say. [Read More]


rss icon

Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Bill Sweeney's picture
While the battlefield and rules of engagement have changed, the people fighting the battle against APTs remain as committed as ever.
Wade Williamson's picture
Although ransomware is commonly targeted at consumers, recent versions have targeted the enterprise with a vengeance. This has shifted ransomware from a nuisance to a potentially debilitating attack that can freeze critical assets and intellectual property.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.