Security Experts:

Virus & Malware
long dotted

NEWS & INDUSTRY UPDATES

Redmond warns that China-based nation state threat actors are taking advantage of a one-year-old law to “stockpile” zero-days for use in sustained malware attacks. [Read More]
Hundreds of regional and national news websites in the United States are delivering SocGholish malware due to a supply chain compromise. [Read More]
Industrial companies continue to be targeted in ransomware attacks, with new threat actors targeting these types of organizations. [Read More]
Apple confirms the active exploitation of CVE-2022-42827, warning in a barebones advisory that the flaw exposes iPhones and iPads to arbitrary code execution attacks. [Read More]
CISA has added a Linux kernel flaw exploited by the Shikitega malware (CVE-2021-3493) to its known exploited vulnerabilities catalog. [Read More]
SafeBreach warns of a new PowerShell backdoor that pretends to be part of the Windows update process. [Read More]
California startup Bolster banks early-stage venture capital funding to build a fraud prevention platform for businesses. [Read More]
European venture capital and private equity firm Smartfin has acquired Hex-Rays, the company behind the widely deployed IDA Pro software disassembler. [Read More]
Zimbra has rushed out patches to provide cover for a code execution flaw that has already been exploited to plant malware on target machines. [Read More]
Zoom has rolled out a high-priority patch for macOS users with a warning that hackers could abuse the software flaw to connect to and control Zoom Apps. [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...