Security Experts:

long dotted


Operators of the Sundown Exploit Kit are outsourcing panel and Domain Generation Algorithm (DGA) coding work and stealing exploits in an attempt to improve its presence on the EK scene. [Read More]
A new variant of the popular Cerber ransomware has emerged that is being distributed via the Magnitude and RIG exploit kits (EKs). [Read More]
Malicious Microsoft Office documents are being used to install rogue proxies, which can enable monitoring of HTTPS content and traffic. [Read More]
Kimpton Hotels & Restaurants confirmed that point-of-sale malware had been installed on servers powering payment card transactions at restaurants and front desks of some its hotels. [Read More]
A new piece of malware called FairWare is targeting Linux servers and deleting web folders, while "offering" to restore access to encrypted files for a ransom of 2 Bitcoins. [Read More]
The malicious software used earlier this month to steal 12 million baht ($346,000) from ATMs at banks in Thailand might be a new ATM malware variant called RIPPER, FireEye researchers reveal. [Read More]
According to Privacy International there are 27 surveillance firms headquartered in Israel, which make technology meant to fight crime and terrorism through legal means. [Read More]
After an eight-month pause, the Ramnit Trojan has resurfaced with two new live attack servers and a new command and control (C&C) server, IBM researchers reveal. [Read More]
Locky ransomware has changed its distribution method once again and is now using DLLs for infection. [Read More]
Security researchers managed to successfully crack the newly spotted Alma ransomware and provide victims with the option to decrypt their files for free. [Read More]


rss icon

Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Bill Sweeney's picture
While the battlefield and rules of engagement have changed, the people fighting the battle against APTs remain as committed as ever.
Wade Williamson's picture
Although ransomware is commonly targeted at consumers, recent versions have targeted the enterprise with a vengeance. This has shifted ransomware from a nuisance to a potentially debilitating attack that can freeze critical assets and intellectual property.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.