Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers at Palo Alto Networks have uncovered a new piece of malware designed to target devices running Apple's OS X and iOS operating systems and might have been installed by hundreds of thousands of users.
Researchers have uncovered a remote administration tool (RAT) called COMpfun that injects itself into the processes running on compromised systems by hijacking legitimate Component Object Model (COM) objects.
A reconnaissance framework documented by researchers earlier this year has been used by multiple threat groups in watering hole attacks targeting organizations in various sectors.
Cybercriminals using the Dridex banking Trojan to steal sensitive information from Internet users have changed the way they are distributing the malware, according to researchers from Palo Alto Networks.
A new piece of malware discovered by researchers at Trend Micro is designed to steal files from infected systems and upload them to the file storage and synchronization service Google Drive.
Microsoft has become aware of targeted cyberattacks leveraging a new vulnerability (CVE-2014-6352) that affects most supported Windows releases.
Researchers have found a way to trick Android users into executing potentially malicious applications by hiding them inside innocent-looking image files.
Cybercriminals are expanding the Linux botnet dubbed "Mayhem" by leveraging the recently discovered vulnerabilities in the GNU Bash shell, according to researchers.
Researchers at Denmark-based security firm CSIS have stumbled upon a new variant of Rovnix, a piece of malware that's designed to download other threats onto infected machines.
Outlier Security, a startup co-founded by former HBGary CEO Greg Hoglund emerged from stealth mode with a new approach on how enterprises can detect threats targeting their endpoints.

FEATURES, INSIGHTS // Malware

rss icon

Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Aviv Raff's picture
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
Aviv Raff's picture
There are four key reasons why cloud-based sandboxes are qualitatively more effective than on-premise appliances...
Jeff Hudson's picture
Organizations need to consider more than just the malware itself if they are to defend against it; the first step in defending against malicious code infections is ensuring that a strong trust infrastructure is in place and well secured.
Wade Williamson's picture
By shortening the scope of an attack, it’s far less likely that response teams will get the chance to analyze such attacks in situ, so to speak.
Wade Williamson's picture
Security in the era of APTs is everyone’s problem, and to truly adapt means each team in an enterprise has to push itself out of its traditional comfort zone. Let’s look at some of these challenges.
Shaun Donaldson's picture
What is it about public cloud that breaks traditional endpoint security? First, let’s consider how traditional endpoint anti-malware ended-up where it is today.
Marc Solomon's picture
To detect, understand and stop advanced threats you need new tools and techniques that enable you to always watch, never forget and take action should a file be determined to be malicious at a later time. In effect, you need to be able to turn back time.
Marc Solomon's picture
Defenders need a new threat-centric approach to security to address the full attack continuum – before, during and after an attack – with continuous visibility into indicators of compromise and retrospective security to quickly contain and stop the damage.
Wade Williamson's picture
It’s important we remember that IT security is essentially an asymmetric struggle. If we don’t adapt, we simply play into the hands of those who want to attack us.
view counter