Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers find new and improved version of Skimer, a malware that allows cybercrooks to steal money from ATMs [Read More]
Auburn, Indiana-based DeKalb Health recently experienced a temporary disruption in the operation of its administrative computer system due to a ransomware attack. [Read More]
Petya, a piece of malware observed in late March to encrypt the entire hard drive of the infected computers, has received an update and is now dropping a second ransomware, researchers warn. [Read More]
An Android banking Trojan discovered a couple of years ago has become a global threat in the past months, after being updated with ransomware capabilities, Doctor Web security researchers warn. [Read More]
The malware used in the Bangladesh Central Bank theft and an unnamed bank in Vietnam could be be linked to other cyberattacks, including the massive attack against Sony Pictures in 2014. [Read More]
In a legal brief, Mozilla warns that “the security of millions of individuals using Mozilla’s Firefox Internet browser could be put at risk by a premature disclosure of the vulnerability. [Read More]
Onapsis warns that there are indicators of exploitation against 36 large-scale global enterprises around the world. [Read More]
Malware actors are exploiting the Flash Player vulnerability, which affects machines running Windows, Mac OS X, Linux and Chrome OS. [Read More]
The Bucbi ransomware, a threat detected back in early 2014, now uses RDP brute force attacks as its delivery mechanism. [Read More]
A new Android banking Trojan capable of spying on users and stealing credit card info is achieving persistency on infected devices by prompting for device administrator rights until the user gives in. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Bill Sweeney's picture
While the battlefield and rules of engagement have changed, the people fighting the battle against APTs remain as committed as ever.