Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Russia-linked threat group APT28 (aka Pawn Storm, Fancy Bear and Sofacy) created a Mac version of its X-Agent Trojan [Read More]
A recently discovered Microsoft Office loader uses malicious macros to drop multiple malware families, Palo Alto Networks security researchers warn. [Read More]
Thousands of Android devices, including ones running Android 6 and 7, infected with Marcher trojan [Read More]
Recent attacks aimed at Polish banks are part of a bigger campaign targeting financial organizations around the world [Read More]
The beginning of 2017 has brought a series of changes on the malware charts, as the Kelihos botnet managed to climb to the top position, while the Conficker worm dropped to fourth on the list. [Read More]
A new Windows variant of Mirai is written in C++ and appears capable of performing various nefarious operations, one of which involves the spreading of the Mirai botnet to Linux-based devices. [Read More]
Hundreds of Arby’s restaurants affected by breach. Hundreds of thousands of credit and debit cards compromised [Read More]
CRYSIS, a ransomware family that emerged last year, is being distributed via Remote Desktop Protocol (RDP) brute force attacks worldwide, Trend Micro security researchers warn. [Read More]
The "Athena" Remote Access Trojan (RAT) is targeting Windows systems and using Tor2Web proxies for communication with the command and control (C&C) server [Read More]
A newly observed ransomware variant is using a technique to bypass User Account Control (UAC) in order to elevate its privileges without displaying a UAC prompt. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Bill Sweeney's picture
While the battlefield and rules of engagement have changed, the people fighting the battle against APTs remain as committed as ever.