Security Experts:

long dotted


Microsoft's Windows Defender blocked more than 80,000 instances of several new variants of the Dofoil (aka Smoke Loader) downloader. [Read More]
Investigation into the September 2017 CCleaner incident reveals what appears to be a stage 3 payload that attackers supposedly intended to deliver to infected users [Read More]
The hackers behind the recent Olympic Destroyer attack planted sophisticated false flags inside their malware in an effort to confuse investigators [Read More]
Analysis of NSA tools leaked by Shadow Brokers provides a glimpse into the methods used by the agency to detect the presence of other state-sponsored actors on devices it hacked [Read More]
A newly discovered piece of malware is capable of stealing a variety of crypto-coins from its victims by replacing legitimate wallet addresses with that of the attacker. [Read More]
Over 160 RMH-owned Applebee’s restaurants had their PoS systems infected with malware designed to capture payment card information [Read More]
State-sponsored threat group interested in inter-Korean affairs continues to launch highly targeted attacks using new malware [Read More]
A newly identified remote access Trojan (RAT) that has been written entirely in Python is being used in highly targeted attacks, Cisco Talos researchers say. [Read More]
Industrial cybersecurity firm Dragos summarizes the activities of five sophisticated threat groups that target industrial control systems (ICS) [Read More]
Hundreds of websites have been infected with malware that masquerades as legitimate ionCube-encoded files, SiteLock warns. [Read More]


rss icon

Scott Simkin's picture
When implemented as part of a natively-engineered security platform, these malware identification and prevention practices can reduce the operational burden put on security teams.
Jack Danahy's picture
Identifying malicious software by recognizing that it just damaged the system or exfiltrated some amount of information is no longer defense, but detection.
Adam Meyer's picture
While malicious actors demanding ransoms is not new, the surge of organizations being targeted with fake extortion demands and empty threats is. Let’s look at how extortion campaigns are carried out through the “avenue of approach” lens.
Jack Danahy's picture
Protection against the effects of ransomware starts with a clear understanding of all of the means that attackers will use to implant that first malicious package.
Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Jack Danahy's picture
The impact of ransomware has expanded from an IT nuisance to attacks that can shut down and potentially ruin the businesses they infect.
Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?