Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers have discovered a new cyber espionage weapon they believe was developed and is used by a China-based APT group they have named SharpPanda. [Read More]
REvil is offered by a Russian hacking group to affiliates, under the Ransomware-as-a-Service (RaaS) business model. [Read More]
Microsoft snaps an early-stage startup ReFirm Labs that helps businesses pinpoint and fix weak links in firmware powering smart devices like light bulbs and connected printers. [Read More]
Passengers planning to make their way over to the islands of Martha’s Vineyard or Nantucket on Wednesday could see delays, The Steamship Authority, which operates a fleet of vessels, said Wednesday, thanks to a ransomware attack. [Read More]
Ongoing, multi-vendor investigations into the SolarWinds mega-hack lead to the discovery of new malware artifacts that could be used in future supply chain attacks, including a poisoned update installer. [Read More]
A KPMG report finds that the email system used by Accellion never sent the email notifications to FTA customers and the company never informed them of the flaw being actively exploited. [Read More]
Kaspersky finds that financial threats diminished while ransomware operators upped their game with spam and calls to clients and partners. [Read More]
Late-state SIEM startup adds a new chief executive and banks a $200 million “growth round” investment at a $2.4 billion valuation. [Read More]
The Microsoft initiative builds on the need for APAC governments to build cyber-defense strategies and keep the region protected from attacks through strong collaboration with tech companies. [Read More]
A new piece of ransomware named Epsilon Red has been spotted targeting organizations (in the United States) via unpatched Microsoft Exchange servers. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.
David Holmes's picture
Take a step back and realize that cryptocurrency mining is really just another form of malware, which is something you should be good at finding already.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.