Security Experts:

long dotted


Google has announced a series of policy changes and updates to improve the overall security of Chrome extensions. [Read More]
Microsoft warns that fileless malware attacks are on the rise, which comes in response to antiviruses being increasingly efficient at detecting malicious executable files [Read More]
FruitFly, a piece of Mac malware that infected thousands of machines over the course of more than 13 years, was being distributed via poorly protected external services [Read More]
After being observed targeting smart homes just two months ago, the Hide ‘N Seek Internet of Things (IoT) botnet is now capable of infecting Android devices. [Read More]
FBI and DHS called in by the Port of San Diego after a piece of ransomware infected some IT systems [Read More]
The financially-motivated "Cobalt" hackers have been establishing a foothold onto victim machines using a piece of malware called SpicyOmelette, Secureworks reveals. [Read More]
Russian cyber-espionage group Fancy Bear (APT28) is the first threat actor to have used a Unified Extensible Firmware Interface (UEFI) rootkit in a malicious campaign, security researchers claim. [Read More]
The discovery of new VPNFilter modules answers most unanswered questions about the malware itself, but researchers haven’t figured out what the threat actor plans on doing next [Read More]
US-based online fashion retailer SHEIN informed customers recently that hackers stole their personal information. Over 6.4 million customers affected [Read More]
Adwind remote access Trojan (RAT) samples detected in a recently campaign were configured to gain persistence on Linux, Windows, and macOS systems, Cisco Talos warns. [Read More]


rss icon

Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.
Scott Simkin's picture
When implemented in series, common malware analysis environments allow security teams to handle the vast majority of threats automatically, freeing up team resources to actively hunt more advanced threats.
Scott Simkin's picture
When implemented as part of a natively-engineered security platform, these malware identification and prevention practices can reduce the operational burden put on security teams.
Jack Danahy's picture
Identifying malicious software by recognizing that it just damaged the system or exfiltrated some amount of information is no longer defense, but detection.