Security Experts:

long dotted


Security researchers have found more than one thousand applications rigged with spyware over the past six months, including some distributed via Google Play. [Read More]
Kaspersky Lab published its latest APT Trends report, highlighting research findings during the second quarter of 2017. [Read More]
Two Iranian nationals have been charged in the U.S. with hacking, identity theft and wire fraud [Read More]
Recent espionage campaigns targeting North Korea show link between KONNI malware and DarkHotel operation [Read More]
A malicious email campaign that has been active for at least two months is targeting Russian-speaking enterprises and delivering a new Windows-based backdoor, Trend Micro warns. [Read More]
The Smoke Loader backdoor (AKA Dofoil) has added more complex anti-analysis techniques that allow it to remain a potent malware delivery mechanism. [Read More]
Over one million users were exposed to adware after the developer of a highly popular Chrome extension fell victim to a phishing attack. [Read More]
The financially-motivated Carbanak (FIN7) hacker group has added a new JScript backdoor to its cyber-weapons arsenal, along with updated macros. [Read More]
Soon after being found to have worm-like spreading capabilities, the TrickBot banking Trojan has expanded its attack surface to target Outlook and Web browsing data. [Read More]
The NotPetya malware attack caused a disruption of worldwide operations for pharma giant Merck [Read More]


rss icon

Jack Danahy's picture
The impact of ransomware has expanded from an IT nuisance to attacks that can shut down and potentially ruin the businesses they infect.
Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?