Security Experts:

Virus & Malware
long dotted


Cybercriminals are delivering the Zyklon malware, which includes data theft and DDoS attack capabilities, using recently patched Office vulnerabilities [Read More]
A 24-year-old man from the UK has pleaded guilty to running services designed to help cybercriminals make their malware difficult to detect [Read More]
A new variant of the disk-wiper malware known as KillDisk has been spotted in attacks aimed at financial organizations in Latin America [Read More]
MaMi is a new piece of malware designed to hijack DNS settings on infected macOS machines. Other capabilities present, but not active [Read More]
Microsoft patches over 50 vulnerabilities, including an Office zero-day similar to the Equation Editor flaw that has been exploited by several threat groups [Read More]
Researchers found that Google Apps Script could have been exploited by hackers to automate malware downloads [Read More]
Clothing retailer Forever 21 informed customers that malware collected data from its payment systems for a period of more than 7 months [Read More]
Feedback Friday – Industry reactions to the United States and other countries accusing North Korea of launching the WannaCry attack [Read More]
Canada, Japan, Australia and New Zealand also accuse North Korea of launching the WannaCry ransomware attack [Read More]
Researchers believe Iran used the Triton/Trisis ICS malware to attack a critical infrastructure organization in Saudi Arabia [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...