Security Experts:

Virus & Malware
long dotted

NEWS & INDUSTRY UPDATES

Emotet’s developers appear to be attempting a rebuild of the botnet, likely looking to recommence their malicious operation. [Read More]
Redmond says the evasive malware delivery method is being leveraged in attacks to deliver remote access Trojans (RATs), banking malware, and other malicious payloads. [Read More]
Chipmakers Intel and AMD release patches for multiple vulnerabilities in multiple products, including a series of high severity issues in software drivers. [Read More]
AT&T Alien Labs researchers flag new Golang-based malware threat that could potentially infect millions of routers and Internet of Things (IoT) devices. [Read More]
Zoom ships multiple security bulletins calling special attention to a pair of “high-risk” bugs affecting its on-prem meeting connector software and the popular Keybase Client. [Read More]
U.S. Vice President Kamala Harris on Wednesday announced support for the Paris Call for Trust and Security in Cyberspace. [Read More]
Palo Alto Networks is calling urgent attention to a critical-severity vulnerability in its GlobalProtect portal and gateway interfaces. [Read More]
An authenticated attacker could exploit the flaw to trigger the restart of the WordPress installation process and create an administrator account. [Read More]
Researchers warn that the malware has extensive spyware capabilities, including data theft, GPS monitoring, and audio and video recording. [Read More]
Microsoft said the two under-attack vulnerabilities exist in Microsoft Exchange Server and Microsoft Excel, two widely deployed products in the Windows ecosystem. [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...