Security Experts:

long dotted


The actor behind the Ursnif banking Trojan has been using new evasive macros in their latest infection campaign, demonstrating continuous evolution of tools and techniques. [Read More]
While these two reports mirror each other in the description of the current threat landscape, they actually come to two different conclusions. [Read More]
Version 3 of the Qadars Trojan targets 18 banks in the UK. The new variant brings improved anti-detection and anti-analysis features [Read More]
HDDCryptor leverages the DiskCryptor open source tool to strongly encrypt user’s data and to overwrite the Master Boot Record (MBR). [Read More]
According McAfee, new malware samples in Q2 2016 totaled more than 40 million, which is the second highest quarterly figure ever recorded. [Read More]
The creator of a piece of mobile malware called Bilal Bot contacted IBM firm to challenge an outdated report produced by IBM. [Read More]
DropboxCache, a Linux backdoor that was found earlier this year to have migrated to Windows, is targeting Mac OS X devices as well, Kaspersky security researchers warn. [Read More]
A recently analyzed Linux rootkit is being distributed via manual installations and targeting both Intel and ARM platforms, embedded platforms included. [Read More]
A new piece of ransomware has been using public sites to host information about its victims and using Google Maps API to determine the victim’s location. [Read More]
Operators of the Sundown Exploit Kit are outsourcing panel and Domain Generation Algorithm (DGA) coding work and stealing exploits in an attempt to improve its presence on the EK scene. [Read More]


rss icon

Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.