Security Experts:

Virus & Malware
long dotted

NEWS & INDUSTRY UPDATES

Ongoing, multi-vendor investigations into the SolarWinds mega-hack lead to the discovery of new malware artifacts that could be used in future supply chain attacks, including a poisoned update installer. [Read More]
A KPMG report finds that the email system used by Accellion never sent the email notifications to FTA customers and the company never informed them of the flaw being actively exploited. [Read More]
Kaspersky finds that financial threats diminished while ransomware operators upped their game with spam and calls to clients and partners. [Read More]
Late-state SIEM startup adds a new chief executive and banks a $200 million “growth round” investment at a $2.4 billion valuation. [Read More]
The Microsoft initiative builds on the need for APAC governments to build cyber-defense strategies and keep the region protected from attacks through strong collaboration with tech companies. [Read More]
A new piece of ransomware named Epsilon Red has been spotted targeting organizations (in the United States) via unpatched Microsoft Exchange servers. [Read More]
An alert released by the FBI and CISA warns that the SolarWinds hackers have abused an email marketing service to send malicious emails to 350 organizations. [Read More]
At least two threat actors supporting the Chinese government’s interests are targeting organizations in the US and Europe. [Read More]
These include new user accounts, specific executable files, FTP transfers, and unrecognized scheduled tasks. [Read More]
The Russia-linked SolarWinds hackers (Nobelium) are launching new attacks on the U.S. in a campaign that abuses a mass mailing service and impersonates a government agency. [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...