Security Experts:

long dotted


Australian transportation and logistics giant Toll Group was forced to shut down some of its customer apps in response to a ransomware attack. [Read More]
China-linked Winnti hackers were observed using a new variant of the ShadowPad backdoor in recent attacks targeting Hong Kong universities. [Read More]
A threat group linked to Iran has targeted a U.S.-based research company whose services are used by businesses and government organizations. [Read More]
Citrix has released the full set of patches for the recently disclosed security flaw tracked as CVE-2019-19781, but attacks on vulnerable systems are ramping up. [Read More]
Paying off hackers after a ransomware infection could end up being a total loss, according to a study released Thursday which finds some attackers just take the money and run. [Read More]
Recent attacks aimed at a key organization in the European energy sector involved PupyRAT, a piece of malware used by Iran-linked threat groups. [Read More]
A new methodology for instigating ransomware makes use of Windows' own Encrypting File System (EFS). [Read More]
The threat actor or group behind the Satan ransomware -- and probably DBGer and Lucky and possibly Iron -- seems to be engaged in a new version or evolution of Satan: 5ss5c. [Read More]
A newly discovered information stealer named Oski is targeting browsers and cryptocurrency wallets, with most victims observed in the United States. [Read More]
CISA has advised organizations using Pulse Secure VPN products to patch their installations as malicious actors continue to exploit a vulnerability fixed in April. [Read More]


rss icon

Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.
David Holmes's picture
Take a step back and realize that cryptocurrency mining is really just another form of malware, which is something you should be good at finding already.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.
Scott Simkin's picture
When implemented in series, common malware analysis environments allow security teams to handle the vast majority of threats automatically, freeing up team resources to actively hunt more advanced threats.