Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cybercriminals have been serving malicious advertisements on several high-profile websites in an effort to push shady software onto the computers of their visitors, regardless if they are Windows or OS X users, Cisco reported on Monday.
The official website of an important Israeli think tank has been compromised and abused to distribute a piece of malware, the security firm Cyphort reported on Friday.
A Windows backdoor used in numerous attacks by a certain threat group has been ported to Mac OS X and fitted with new features, researchers at FireEye reported.
Cybercriminals managed to breach one of the servers used for HealthCare.gov, the official website of the United States' health insurance marketplace, federal officials reported on Thursday.
In recent attacks that used the Angler exploit kit, malicious code was injected directly into running processes instead of being written to the disk.
A new variant of the Bifrose backdoor has been used in a cyberattack aimed at an unnamed device manufacturer, Trend Micro reported.
A new variant of BlackPOS (Kaptoxa), a piece of RAM scraping malware designed to target point-of-sale (PoS) systems, has been spotted in the wild by researchers at Trend Micro.
Srizbi, once considered one of the most powerful botnets, is apparently trying to make a comeback with the aid of a new piece of malware, F-Secure reported.
A major online advertising company has been serving malicious ads on several high-profile websites, Fox-IT reported on Wednesday.
Small and medium companies in the European automobile sector have been targeted by cybercriminals using a relatively new piece of malware, Symantec has warned.

FEATURES, INSIGHTS // Malware

rss icon

Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Aviv Raff's picture
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
Aviv Raff's picture
There are four key reasons why cloud-based sandboxes are qualitatively more effective than on-premise appliances...
Jeff Hudson's picture
Organizations need to consider more than just the malware itself if they are to defend against it; the first step in defending against malicious code infections is ensuring that a strong trust infrastructure is in place and well secured.
Wade Williamson's picture
By shortening the scope of an attack, it’s far less likely that response teams will get the chance to analyze such attacks in situ, so to speak.
Wade Williamson's picture
Security in the era of APTs is everyone’s problem, and to truly adapt means each team in an enterprise has to push itself out of its traditional comfort zone. Let’s look at some of these challenges.
Shaun Donaldson's picture
What is it about public cloud that breaks traditional endpoint security? First, let’s consider how traditional endpoint anti-malware ended-up where it is today.
Marc Solomon's picture
To detect, understand and stop advanced threats you need new tools and techniques that enable you to always watch, never forget and take action should a file be determined to be malicious at a later time. In effect, you need to be able to turn back time.
Marc Solomon's picture
Defenders need a new threat-centric approach to security to address the full attack continuum – before, during and after an attack – with continuous visibility into indicators of compromise and retrospective security to quickly contain and stop the damage.
Wade Williamson's picture
It’s important we remember that IT security is essentially an asymmetric struggle. If we don’t adapt, we simply play into the hands of those who want to attack us.