Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The first half of 2019 was dominated by an increase in malware using encryption, and in malware targeting Internet of Things (IoT) devices, a recent threat report reveals. [Read More]
The power company in the South African city of Johannesburg has suffered serious disruptions after its systems became infected with a piece of ransomware. [Read More]
The WatchBog cryptocurrency-mining botnet has recently added a scanner for the BlueKeep RDP protocol vulnerability, security researchers say. [Read More]
Guildma is complex and stealthy malware that originates in Brazil is a combination of RAT, spyware, password stealer and banking malware. [Read More]
Officials of an Indiana county say they are trying to determine the extent of a malware attack on the county’s computers. [Read More]
Recently disclosed vulnerabilities affecting some WordPress plugins have been exploited by cybercriminals in a malvertising campaign. [Read More]
The Iran-linked cyber-espionage group OilRig has started using three new malware families in campaigns observed over the past month, FireEye reports. [Read More]
New analysis from Symantec shows the extent of the growth in targeted ransomware attacks against organizations over the last two years -- and especially since the beginning of this year. [Read More]
Researchers discover a new malware framework that managed to gather over one billion fraudulent ad impressions in the past three months. [Read More]
A recently discovered ongoing campaign attributed to the StrongPity threat actor abuses malicious WinBox installers to infect victims, AT&T’s Alien Labs security researchers reveal. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

David Holmes's picture
Take a step back and realize that cryptocurrency mining is really just another form of malware, which is something you should be good at finding already.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.
Scott Simkin's picture
When implemented in series, common malware analysis environments allow security teams to handle the vast majority of threats automatically, freeing up team resources to actively hunt more advanced threats.
Scott Simkin's picture
When implemented as part of a natively-engineered security platform, these malware identification and prevention practices can reduce the operational burden put on security teams.