Security Experts:

long dotted


Sophos researchers have tracked the evolution of SamSam through its three versions. It shows a developer getting evermore proficient in his craft. [Read More]
Check Point has uncovered a large Malvertising campaign that leverages thousands of compromised WordPress websites, involves multiple parties in the online advertising chain and distributes malicious content via multiple Exploit Kits. [Read More]
The PowerGhost crypto-miner is capable spreading across corporate networks and of stealthily infecting both workstations and servers. [Read More]
A multi-tier attack relied on compromising the shared infrastructure between a software supplying partner of an application vendor. [Read More]
A newly discovered remote access Trojan (RAT) dubbed Parasite HTTP includes a broad range of protections, including sandbox detection, anti-debugging, anti-emulation, and more, Proofpoint reports. [Read More]
Two Dutch men sentenced to 240 hours of community service for creating and using CoinVault, one of the first pieces of file-encrypting ransomware [Read More]
Symantec details Leafminer, a relatively new cyber espionage campaign linked to Iran. Attackers target governments and other organizations in the Middle East [Read More]
A series of recent attacks attributed to an Iran-linked cyber-espionage group delivered a PowerShell backdoor onto compromised machines, Palo Alto Networks has discovered. [Read More]
Ransomware hits Chinese shipping giant Cosco. The incident led to disruptions of the company’s website, phones and email systems in the U.S. [Read More]
The Kronos banking Trojan is showing renewed strength and has been very active over the past several months, Proofpoint security researchers warn. [Read More]


rss icon

Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.
David Holmes's picture
Take a step back and realize that cryptocurrency mining is really just another form of malware, which is something you should be good at finding already.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.