Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The U.K. government’s cybersecurity agency plans to ship a collection of well-tested, reliable scanning scripts to help defenders mitigate high-priority software flaws. [Read More]
Security updates released for PrinterLogic Web Stack and the Virtual Appliance address nine security bugs, including a trio of high-severity issues. [Read More]
The Log4Shell vulnerability hasn’t seen mass exploitation yet, but attacks might be picking up as botnets start exploiting it. [Read More]
Redmond announces improved security for Microsoft Offices users, courtesy of Excel 4.0 (XLM) macros now being restricted by default. [Read More]
In the recent Ukraine attacks, threat actors leveraged stolen credentials and they likely had access to the targeted network for months before causing damage. [Read More]
Cloud security and compliance automation startup Anitian has banked a $55 million Series B round led by Sageview Capital. [Read More]
The IPv6 guidance provides federal agencies with information on IPv6 and its security features, along with security considerations on the network protocol. [Read More]
The use of DNS over HTTPS (DoH) for C&C communications is making it more difficult to track botnets. [Read More]
Active for roughly half a year, the malware has been attributed to Wizard Spider, the threat actor behind Conti and Ryuk. [Read More]
Threat hunters at Kaspersky have spotted a well-known Chinese APT actor using an UEFI implant to maintain stealthy persistence across reboots, disk formatting or disk replacements. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Derek Manky's picture
Botnets are becoming more malicious, sometimes able to create hundreds of thousands of drones that can attack a variety of machines, including Mac systems, Linux, Windows systems, edge devices, IoT devices, and so on.
Derek Manky's picture
How can organizations fight ransomware? The best solution is always prevention. Here are three tactics toward that goal.
Idan Aharoni's picture
The fact that so many large and high-profile enterprises fall prey to ransomware attacks that in many cases does not pose any new technical challenge suggests that there are still many gaps that needs to be closed.
Gordon Lawson's picture
Threat hunting must be non-attributable, while maintaining a clear audit trail to satisfy legal and governance requirements.
Derek Manky's picture
Each side of the public-private collaboration has resources and capabilities that shore up the other and increase effectiveness in combatting cybercrime.
Tim Bandos's picture
The ransomware threat could still become more pervasive over the next two to three years, not because ransomware is effective in and of itself but because of other players in the game continue to fan the flames.
Derek Manky's picture
2020 has taught us to revisit the practice of inspecting encrypted traffic. These are all standard security protocols to step up in light of what cybercriminals are doing now.
Joshua Goldfarb's picture
Playing whack-a-mole with malicious code infections, phishing sites, and compromised credentials won’t help an enterprise reduce losses due to fraud.
Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.