Security Experts:

long dotted


The authors of a new piece of ransomware called CryptXXX decided to also pack their malware with information stealing capabilities. [Read More]
Kovter, a recently discovered piece of ransomware, represents the latest step in the evolution of a malicious program from police scareware to ad fraud Trojan and now file-encrypting malware. [Read More]
Ransomware authors are using blockchain technology to deliver decryption keys. [Read More]
Cisco researchers identified over 3 million vulnerable systems that could get infected with file-encrypting ransomware [Read More]
An improved version of the Qbot malware has been spotted by researchers in attacks aimed at public institutions [Read More]
Atmos, a derivative of the ZeuS/Citadel stable, has been detected targeting banks in France. The malware has been active since late 2015, but this seems to be its first concerted use. [Read More]
The developers behind the Locky ransomware are tireless in their quest to evade security controls and gain a higher infection rate, and they have recently implemented a variety of changes to the ransomware’s code to support their mission. [Read More]
Mike Olsen, co-founder of Proctorio warned that a set of security cameras he had purchased from Amazon had been infected with malware. [Read More]
While the threat has infected systems around the world, a heavy concentration of attacks have registered in Germany and France, Kaspersky Lab says. [Read More]
Locky, a popular ransomware family that emerged earlier this year, has been displaying changes in its communication patterns in recent weeks, Check Point researchers say. [Read More]


rss icon

Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Bill Sweeney's picture
While the battlefield and rules of engagement have changed, the people fighting the battle against APTs remain as committed as ever.
Wade Williamson's picture
Although ransomware is commonly targeted at consumers, recent versions have targeted the enterprise with a vengeance. This has shifted ransomware from a nuisance to a potentially debilitating attack that can freeze critical assets and intellectual property.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.