Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A new piece of ransomware analyzed by researchers from iSIGHT Partners uses visual components borrowed from CryptoLocker and CryptoWall.
Researchers have uncovered a new variant of the Bugat banking Trojan which uses HTML injection techniques that are very similar to the ones used by Gameover Zeus.
Krysanec, a remote access Trojan (RAT) for Android, is capable of infiltrating both free and paid Android apps, and it has been distributed via a file sharing website.
According to Damballa, there is no correlation between the size of an organization and the proportion of machines infected with malware.
Cyber-attackers backed by China conducted “a series of apparently targeted, sophisticated cyber-attacks” against activists representing the Uyghurs, a group of researchers have found.
The use of virtualized systems in a enterprise environments can provide many benefits, but these systems need some special attention paid to security, Symantec said in a new report examining threats to virtual environments.
The Chicago Yacht Club has determined that a piece of malware was installed on one of its point-of-sale (PoS) servers between April 26 and June 21.
Director of Kaspersky Lab Global Research & Analysis Team Costin Raiu joins the podcast to discuss the latests discoveries surrounding the Epic Turla cyber-espionage campaign.
Two new two new Gameover Zeus variants generate roughly 1,000 domains per day and 10,000 domains per day.
FireEye and Fox-IT have teamed up to provide a new service to assist users whose computers have been infected with the notorious CryptoLocker ransomware.

FEATURES, INSIGHTS // Malware

rss icon

Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Aviv Raff's picture
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
Aviv Raff's picture
There are four key reasons why cloud-based sandboxes are qualitatively more effective than on-premise appliances...
Jeff Hudson's picture
Organizations need to consider more than just the malware itself if they are to defend against it; the first step in defending against malicious code infections is ensuring that a strong trust infrastructure is in place and well secured.
Wade Williamson's picture
By shortening the scope of an attack, it’s far less likely that response teams will get the chance to analyze such attacks in situ, so to speak.
Wade Williamson's picture
Security in the era of APTs is everyone’s problem, and to truly adapt means each team in an enterprise has to push itself out of its traditional comfort zone. Let’s look at some of these challenges.
Shaun Donaldson's picture
What is it about public cloud that breaks traditional endpoint security? First, let’s consider how traditional endpoint anti-malware ended-up where it is today.
Marc Solomon's picture
To detect, understand and stop advanced threats you need new tools and techniques that enable you to always watch, never forget and take action should a file be determined to be malicious at a later time. In effect, you need to be able to turn back time.
Marc Solomon's picture
Defenders need a new threat-centric approach to security to address the full attack continuum – before, during and after an attack – with continuous visibility into indicators of compromise and retrospective security to quickly contain and stop the damage.
Wade Williamson's picture
It’s important we remember that IT security is essentially an asymmetric struggle. If we don’t adapt, we simply play into the hands of those who want to attack us.