Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Most ransomware is deployed after hours, and usually several days after the initial compromise, newly published research from FireEye reveals. [Read More]
It may look like an email from a supervisor with an attachment on the new "work from home policy." But it could be a cleverly designed scheme to hack into your network. [Read More]
A piece of Android stalkerware called MonitorMinor has a far wider range of functions than other threats of this type, allowing attackers to steal data and control devices. [Read More]
Another COVID-19 (Coronavirus) phishing campaign has been discovered -- this one apparently operated by the Pakistan-based APT36, which is thought to be nation-backed. [Read More]
Researchers from Check Point Research have found a spear-phishing campaign leveraging COVID-19 (Coronavirus) themed malware attacks. [Read More]
The Russia-linked threat group known as Turla was observed using two new pieces of malware in its attacks. [Read More]
Hackers have already started exploiting CVE-2020-10189, a recently patched vulnerability in ManageEngine Desktop Central. [Read More]
The City of Durham and the Durham County government in North Carolina are in the process of recovery after experiencing what appears to be a ransomware attack on March 6. [Read More]
Employing techniques usually associated with nation-state threat actors, human-operated ransomware attacks represent a growing threat to businesses, Microsoft warned. [Read More]
MoleRATs, a politically-motivated threat actor apparently linked to the Palestinian terrorist organization Hamas, has expanded its target list to include insurance and retail industries. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.
David Holmes's picture
Take a step back and realize that cryptocurrency mining is really just another form of malware, which is something you should be good at finding already.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.
Scott Simkin's picture
When implemented in series, common malware analysis environments allow security teams to handle the vast majority of threats automatically, freeing up team resources to actively hunt more advanced threats.