Security Experts:

Virus & Malware
long dotted

NEWS & INDUSTRY UPDATES

Threat hunters at Kaspersky find a malicious campaign that abuses Windows event logs to store fileless last stage Trojans and keep them hidden in the file system. [Read More]
Google's Threat Analysis Group (TAG) observed an increased number of threat actors using cyberattack themes related to the war in Ukraine. [Read More]
Hubble Technology banks $9 million in venture capital funding to build an “agentless technology asset visibility” aimed at disrupting the asset management space. [Read More]
The China-aligned threat actor was observed employing a trial-and-error approach to abusing traditional antivirus applications for DLL sideloading. [Read More]
Researcher shows how DLL hijacking vulnerabilities affecting most ransomware can be exploited to control and terminate the malware before it can encrypt files on compromised systems. [Read More]
Mandiant warns that a new threat actor is using backdoors to remain undetected for "an order of magnitude longer than the average dwell time of 21 days in 2021." [Read More]
Traceable AI, a startup building technology to reduce attack surfaces in APIs, has banked a new $60 million funding round that values the company at $450 million. [Read More]
Russian government-backed APT29 was observed using new malware families in attacks targeting diplomatic organizations in Europe, the Americas, and Asia. [Read More]
A dozen companies have been targeted by the new Black Basta ransomware and researchers say there may be some links to Conti. [Read More]
Initially observed in attacks in March 2022, the downloader has been used to drop payloads such as Cobalt Strike and Meterpreter, among others. [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...