Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

More than 3 million new malware samples targeting the Android operating system were discovered in 2017, marking a slight decrease from the previous year, G Data reports. [Read More]
A malicious attack uses a multi-stage infection to deploy a tool capable of stealing passwords from various applications on the victim’s computer, Trustwave reports. [Read More]
The United States, Canada, Australia and New Zealand have joined the U.K. in blaming Russia for the destructive NotPetya attack launched last summer [Read More]
Malware researchers tend to stop short of saying, 'this country or that actor is behind this attack'. Nevertheless, they are not shy in dropping hints, leaving the reader to make subjective conclusions. [Read More]
UK officially accuses the Russian government of being behind the NotPetya attack, which cost major organizations millions [Read More]
A newly discovered variant of the AndroRAT mobile malware can inject root exploits to perform malicious tasks [Read More]
Cryptocurrency mining malware is not uncommon on industrial systems, according to several cybersecurity firms [Read More]
The websites of numerous government, health and education organizations worldwide were infected with a crypto-currency miner over the weekend, after a script running on all of them was maliciously modified. [Read More]
Decryption keys for a current version of Cryakl ransomware have been obtained and uploaded to the NoMoreRansom website [Read More]
Researchers have discovered a new Point of Sale (POS) malware, but have not been able to determine whether it is new code still being developed, or already used in attacks. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.
Scott Simkin's picture
When implemented in series, common malware analysis environments allow security teams to handle the vast majority of threats automatically, freeing up team resources to actively hunt more advanced threats.
Scott Simkin's picture
When implemented as part of a natively-engineered security platform, these malware identification and prevention practices can reduce the operational burden put on security teams.
Jack Danahy's picture
Identifying malicious software by recognizing that it just damaged the system or exfiltrated some amount of information is no longer defense, but detection.