Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Botnets are widespread worldwide, serving whichever purpose they were designed to, and the United States is one of the largest sources of botnet attacks. [Read More]
A recently discovered DNSMessenger campaign is abusing compromised U.S. state government servers to host malware, Cisco Talos security researchers say. [Read More]
Microsoft patches 62 vulnerabilities, including a critical Office zero-day exploited to deliver data-stealing malware [Read More]
A newly detailed malware targeting automated teller machines (ATM) allows attackers to completely drain available cash, Kaspersky Lab researchers have discovered. [Read More]
Iran-linked threat group OilRig has been using a new Trojan in attacks aimed at entities in the Middle East [Read More]
Attackers inject themselves into ongoing email exchanges in highly targeted spear-phishing attacks aimed at entities around the world [Read More]
Various industries in the US and South Korea targeted in several high-volume FormBook distribution campaigns [Read More]
New backdoor uses an FTP server for command and control (C&C), Trend Micro researchers warned [Read More]
Fast food restaurant chain Sonic Drive-In confirms payment card breach and offers affected customers free identity theft protection services [Read More]
Cyber espionage groups hacking each other, a practice dubbed by researchers “fourth-party collection,” creates attribution hell [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.
Scott Simkin's picture
When implemented in series, common malware analysis environments allow security teams to handle the vast majority of threats automatically, freeing up team resources to actively hunt more advanced threats.
Scott Simkin's picture
When implemented as part of a natively-engineered security platform, these malware identification and prevention practices can reduce the operational burden put on security teams.
Jack Danahy's picture
Identifying malicious software by recognizing that it just damaged the system or exfiltrated some amount of information is no longer defense, but detection.
Adam Meyer's picture
While malicious actors demanding ransoms is not new, the surge of organizations being targeted with fake extortion demands and empty threats is. Let’s look at how extortion campaigns are carried out through the “avenue of approach” lens.
Jack Danahy's picture
Protection against the effects of ransomware starts with a clear understanding of all of the means that attackers will use to implant that first malicious package.