Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

North Korea-linked hacking group Lazarus has been leveraging a Mac variant of the Dacls RAT in its attacks. [Read More]
Researchers have uncovered evidence of a five-year stealth campaign that they believe to be conducted by the Naikon Chinese APT group. [Read More]
Australian shipping giant Toll has shut down some of its IT systems after discovering a piece of ransomware. This is the second ransomware incident disclosed by the company this year. [Read More]
A threat actor managed to infect more than 75% of the devices within a company by distributing their Android malware through a mobile device management (MDM) server. [Read More]
The United States has the highest number of malicious domains with names associated with the current coronavirus crisis. [Read More]
A new piece of Android malware named EventBot is targeting the users of close to 300 financial applications across the United States and Europe. [Read More]
A piece of Android ransomware uses a scareware tactic to extort money from victims: it asks them to provide their credit card information to pay a fine. [Read More]
PhantomLance is a long-running spyware campaign targeting Android users that bears the marks of Vietnam-linked hacking group OceanLotus. [Read More]
The developers behind the Shade ransomware announced that they ceased operations and publicly released decryption keys to let their victims recover files for free. [Read More]
Kaspersky has teamed up with SecurityWeek for a three-day virtual event where researchers and other industry professionals will discuss malware, exploits, threat hunting, and other interesting topics. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Scott Simkin's picture
When implemented as part of a natively-engineered security platform, these malware identification and prevention practices can reduce the operational burden put on security teams.
Jack Danahy's picture
Identifying malicious software by recognizing that it just damaged the system or exfiltrated some amount of information is no longer defense, but detection.
Adam Meyer's picture
While malicious actors demanding ransoms is not new, the surge of organizations being targeted with fake extortion demands and empty threats is. Let’s look at how extortion campaigns are carried out through the “avenue of approach” lens.
Jack Danahy's picture
Protection against the effects of ransomware starts with a clear understanding of all of the means that attackers will use to implant that first malicious package.
Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Jack Danahy's picture
The impact of ransomware has expanded from an IT nuisance to attacks that can shut down and potentially ruin the businesses they infect.
Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?