The Microsoft Defender for Endpoint on Linux hits GA milestone and now provides endpoint detection and response (EDR) capabilities to all users. [Read More]
CrowdStrike shares an analysis of Sunspot, a piece of malware that was used by hackers to insert the Sunburst backdoor into SolarWinds’ Orion product in the recent supply chain attack. [Read More]
Bitdefender has released a free decryptor for DarkSide, a piece of ransomware that allegedly helped cybercriminals make millions from targeted companies. [Read More]
Ongoing coverage of the SolarWinds Orion attacks and useful resources, including analysis and indicators of compromise (IOC). Check back often for updates. [Read More]
Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...