Security Experts:

long dotted


The U.S. Cyber Command (USCYBERCOM) has uploaded new malware samples to VirusTotal, all of which appear to be used by the North Korean-linked threat group Lazarus. [Read More]
Convenience store and gas station chain Rutter’s has informed customers that malware has been found on payment processing systems, with over 70 stores affected. [Read More]
KBOT, a piece of malware designed to steal information from infected machines, is the first “living virus” spotted in years, according to Kaspersky. [Read More]
Several cybersecurity companies have spotted various campaigns that leverage coronavirus-themed emails to deliver malware, phishing and scams. [Read More]
IBM says attacks targeting OT infrastructure increased by over 2000 percent in 2019, and the most commonly seen piece of malware was the Mirai variant Echobot. [Read More]
The City of North Miami Beach last week announced that ransomware was found on computers within its police department’s network. [Read More]
The University of Maastricht, The Netherlands (UM), has paid a ransom of 30 Bitcoins (about $240,000 at the time) for a decryption key to the CLOP ransomware. [Read More]
Three major manufacturers had some IoT devices running Windows 7 infected with malware in what experts believe to be a supply chain attack. [Read More]
Malicious optimizer, booster, and utility applications hosted on Google Play gathered nearly half a million downloads before being taken down. [Read More]
An active attack campaign is using BitBucket to deliver an arsenal of malware that is able to steal data, mine for cryptocurrency, and deliver ransomware to victims all over the world. [Read More]


rss icon

John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.