Security Experts:

long dotted


A newly observed ransomware family that was written in Python fetches a unique key for each of the victim’s files before encryption, Kaspersky researchers warn. [Read More]
The latest variant of the notorious Cerber ransomware family is currently featured in several infection campaigns, security researchers warn. [Read More]
DXXD ransomware targets servers and encrypts files on network shares even if they haven’t been mapped to the infected computer. [Read More]
A highly obfuscated malicious backdoor that has been infecting organizations worldwide since 2013 was recently observed abusing the Windows Troubleshooting Platform (WTP) feature for distribution. [Read More]
The RIG toolkit became the most active exploit kit (EK) in September, accounting for nearly one quarter of EK attacks during the timeframe, a new report from Symantec reveals. [Read More]
A new malicious JavaScript can hijack a Web browser’s homepage and shut down computers to keep them from terminating the attack. [Read More]
Malware is increasingly using Windows Management Instrumentation (WMI) queries to evade detection and to determine the environment it is running in, FireEye researchers warn. [Read More]
The Spotify Free online music service has been serving malicious advertisements that could automatically open a web browser and redirect them to malware-laden sites. [Read More]
Cerber ransomware now has the ability to kill many database processes with the use of a close_process directive in the configuration file. [Read More]
The actor behind WildFire, a piece of ransomware that emerged earlier this year, has decided to rebrand the malware after security researchers created a decryption tool for it. [Read More]


rss icon

Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.