Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers at Websense have come across a new piece of malware that leverages legitimate websites and services in an effort to disguise its malicious activities.
Researchers at SentinelOne have analyzed a new variant of the notorious banking Trojan Zeus and managed to access the control panel used by cybercriminals to monitor and control their operations.
Hackers encrypt information stored in website databases and hold it for ransom in a type of attack dubbed by researchers "RansomWeb"
Suits and Spooks DC will be held at the Ritz-Carlton, Pentagon City on February 4-5. Take a look at the agenda to see why this will be one of the hottest events of the year!
A new variant of the CTB-Locker (Critroni) ransomware has been spotted in the wild by researchers at Trend Micro.
The computers of gamers in Taiwan and other Asian countries might have been infected with a piece of malware after cybercriminals managed to compromise official installers and updates for a couple of popular online games.
Australia and New Zealand are increasingly targeted with ransomware that’s designed to encrypt files and hold them for ransom, researchers at Trend Micro reported.
A worm spotted on computers in North Korea shows why the source of a cyberattack should never be determined based only on IP addresses.
Cybercrooks have been distributing a Bitcoin mining malware with the aid of a cracked version of the Andromeda bot, Fortinet researchers reported on Wednesday.
Researchers at Microsoft have spotted a new variant of the Emotet Trojan, a threat used by cybercriminals to collect banking credentials

FEATURES, INSIGHTS // Malware

rss icon

Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
Mark Hatton's picture
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Aviv Raff's picture
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
Aviv Raff's picture
There are four key reasons why cloud-based sandboxes are qualitatively more effective than on-premise appliances...
Jeff Hudson's picture
Organizations need to consider more than just the malware itself if they are to defend against it; the first step in defending against malicious code infections is ensuring that a strong trust infrastructure is in place and well secured.
Wade Williamson's picture
By shortening the scope of an attack, it’s far less likely that response teams will get the chance to analyze such attacks in situ, so to speak.
Wade Williamson's picture
Security in the era of APTs is everyone’s problem, and to truly adapt means each team in an enterprise has to push itself out of its traditional comfort zone. Let’s look at some of these challenges.
Shaun Donaldson's picture
What is it about public cloud that breaks traditional endpoint security? First, let’s consider how traditional endpoint anti-malware ended-up where it is today.
Marc Solomon's picture
To detect, understand and stop advanced threats you need new tools and techniques that enable you to always watch, never forget and take action should a file be determined to be malicious at a later time. In effect, you need to be able to turn back time.