Security Experts:

long dotted


China-linked threat actor APT10 was observed launching a large-scale campaign against Japanese organizations and their subsidiaries. [Read More]
SecurityWeek and VirusTotal will host a free live workshop on Thursday, November 19th from 1PM - 3PM ET on "Threat Hunting With VirusTotal - Black Belt Edition". [Read More]
Cybereason Nocturnus security researchers have identified an active campaign focused on the users of a large e-commerce platform in Latin America. [Read More]
A sophisticated APT group believed to be operating out of China has been stealthily targeting Southeast Asian governments over the past three years. [Read More]
The North Korea-linked Lazarus group has been targeting users in South Korea via a supply chain attack that involves software required by government and banking websites. [Read More]
International biotechnology company Miltenyi Biotec says it has fully recovered from a malware attack that affected parts of its network over the past couple of weeks. [Read More]
Schneider Electric has warned its customers about Drovorub, a Russia-linked Linux malware that was recently detailed by the NSA and FBI. [Read More]
At least one ransomware operator appears to have added to their arsenal an exploit for a recently patched vulnerability in Oracle WebLogic. [Read More]
Cybercriminals who breached the systems of Japanese video game giant Capcom are demanding $11 million after deploying ransomware and stealing vast amounts of data. [Read More]
A Russian-speaking threat actor has been targeting hundreds of industrial enterprises for more than two years, their main goal being to steal money. [Read More]


rss icon

Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.