Security Experts:

Virus & Malware
long dotted

NEWS & INDUSTRY UPDATES

A series of geopolitically motivated attacks ongoing since early 2017 and targeting high profile organizations worldwide appear to be a symptom of escalating tensions in the Middle East [Read More]
Ransomware is the most prevalent type of malware and it increasingly targets business-critical systems, according to Verizon’s 2018 Data Breach Investigations Report (DBIR) [Read More]
VirusTotal announces launch of a new Android sandbox called VirusTotal Droidy, which provides detailed information on potential Android threats [Read More]
Kaspersky releases source code of KLara, the company’s internal distributed YARA scanner [Read More]
PinkKite: new piece of malware targeting point-of-sale (POS) systems has a very small size but can do a lot on infected systems [Read More]
Russia-linked threat group Sofacy spotted targeting a European government agency just as the U.S. accused the Kremlin of launching attacks on critical infrastructure [Read More]
Malware can stealthily steal data from air-gapped computers using headphones and speakers, researchers demonstrate [Read More]
A China-linked cyber espionage group used new backdoors in an attack aimed at a company that provides services to the UK government [Read More]
Attacks carried out by the Russian group Sofacy (Fancy Bear/APT28) overlap with campaigns conducted by Turla and actors linked to China and the U.S. [Read More]
Slingshot is a sophisticated cyber espionage campaign that targets entities in the Middle East and Africa via routers, and the group behind the operation apparently speaks English [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...