Security Experts:

long dotted


New versions of the MM Core APT malware target not only the Middle East and Central Asia, but also organizations in the U.S. and Africa [Read More]
FireCrypt is a new ransomware family capable not only of encrypting victims’ files, but also of launching DDoS attacks. [Read More]
Ransomware has long proven to be a major threat for both consumers and enterprises, and a recent campaign targeting company Human Resources (HR) departments proves that once again. [Read More]
The pseudo-Darkleech campaign, one of the long-standing prominent distributers of ransomware, is expected to remain strong in 2017. [Read More]
Decryption tools are now available for three ransomware families that have been discovered during the past few weeks, allowing victims to recover files without paying a dime. [Read More]
Experts cast doubt over reports that Russian military intelligence used Android malware to track Ukrainian artillery forces [Read More]
US officials claim electric grid was hacked by Russia, but the affected utility said malware was found on only one laptop that was not connected to the grid [Read More]
The Sundown exploit kit has started using steganography to hide its exploits in harmless-looking image files [Read More]
InterContinental Hotels is investigating a possible payment card breach at some of its hotels in the United States [Read More]
A new variant of the KillDisk malware encrypts files and holds them for ransom instead of deleting them [Read More]


rss icon

Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Bill Sweeney's picture
While the battlefield and rules of engagement have changed, the people fighting the battle against APTs remain as committed as ever.
Wade Williamson's picture
Although ransomware is commonly targeted at consumers, recent versions have targeted the enterprise with a vengeance. This has shifted ransomware from a nuisance to a potentially debilitating attack that can freeze critical assets and intellectual property.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.