Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Malware and phishing attacks growingly abuse SSL to increase their chances of success, Zscaler said in its latest report [Read More]
McAfee has discovered an implant that they believe was used as a second-state payload in the recent fileless attacks targeting organizations involved with the upcoming Olympics Games in Pyeongchang, South Korea. [Read More]
Maliciously modified copies of popular applications distributed via the MacUpdate site were observed installing crypto-mining malware on the users’ Macs. [Read More]
Europol and UK’s NCA announced that users and sellers of the LuminosityLink RAT have been targeted in an operation involving over a dozen law enforcement agencies [Read More]
Russian national Pyotr (Peter) Levashov, accused of being the mastermind behind the Kelihos botnet, extradited from Spain to the U.S. [Read More]
FireEye and Cisco have linked the latest Flash Player zero-day attacks to a North Korean group known to target South Korea [Read More]
Focused on mining Monero crypto-currency, a new botnet has managed to ensnare over half a million machines to date, most of which are believed to be servers. [Read More]
The newly discovered WannaMine, the crypto-mining worm spreads using EternalBlue, the NSA-linked tool that became public in April 2017, one month after Microsoft released a patch for it. [Read More]
Researchers find more than 130 malware samples exploiting the Meltdown and Spectre vulnerabilities, including malware for Windows, Linux, macOS and browsers [Read More]
Crooks have been targeting automated teller machines (ATMs) in the United States to make them spill out cash using an attack technique known as “jackpotting.” [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Adam Meyer's picture
While malicious actors demanding ransoms is not new, the surge of organizations being targeted with fake extortion demands and empty threats is. Let’s look at how extortion campaigns are carried out through the “avenue of approach” lens.
Jack Danahy's picture
Protection against the effects of ransomware starts with a clear understanding of all of the means that attackers will use to implant that first malicious package.
Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Jack Danahy's picture
The impact of ransomware has expanded from an IT nuisance to attacks that can shut down and potentially ruin the businesses they infect.
Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.