Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A recently observed variant of the TrickBot banking Trojan has added a new module that can lock a victim’s computer for extortion purposes, Webroot reports. [Read More]
An Iran-linked cyber-espionage group has been using new malware and data exfiltration techniques in recent attacks, security firm Nyotron has discovered. [Read More]
A newly discovered Android Trojan is abusing Telegram’s Bot API to communicate with the command and control (C&C) server and to exfiltrate data. [Read More]
Around 18,500,000 websites are infected with malware at a given time each week; while the average website is attacked 44 times every day. [Read More]
Slingshot, the cyber espionage campaign recently exposed by Kaspersky, is a US government operation targeting terrorists, according to a report [Read More]
Synopsys tells customers to change their passwords for Coverity Scan after the service was hacked and abused for cryptocurrency mining [Read More]
PinkKite: new piece of malware targeting point-of-sale (POS) systems has a very small size but can do a lot on infected systems [Read More]
Russia-linked threat group Sofacy spotted targeting a European government agency just as the U.S. accused the Kremlin of launching attacks on critical infrastructure [Read More]
Microsoft's 23rd bi-annual Security Intelligence Report (SIR) draws on data analysis of Microsoft's global estate since February 2017. [Read More]
Hundreds of organizations all around the world have been targeted in recent campaigns using the Qrypter remote access Trojan (RAT), Forcepoint reveals. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.