Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A fake WannaCry ransomware variant was delivered using the same channel as recent NotPetya wiper attack, Kaspersky Lab reports. [Read More]
While the number of malware samples detected in 2016 decreased by 14%, threats have been more sophisticated, according to AV-TEST [Read More]
ESET security researchers performed a detailed analysis of a stealthy backdoor the group behind the NotPetya destructive wiper injected into the legitimate resources of tax accounting software M.E.Doc earlier this year. [Read More]
Kaspersky Lab security researchers have observed a new step in the evolution of the Neutrino malware, with a recently observed variant targeting point of sale (PoS) terminals. [Read More]
Industry professionals comment on the destructive attacks involving the wiper malware known as Petya.A, Petrwrap, NotPetya, exPetr and GoldenEye [Read More]
The Petya/NotPetya ransomware used in the global attack ongoing for the past two days was in fact hiding a wiper and was clearly aimed at data destruction, security researchers have discovered. [Read More]
Companies in the video game industry and possibly other sectors targeted in attacks involving improved variants of the PlugX malware [Read More]
Organizations worldwide are currently under a cyber-attack involving the year-old Petya ransomware, security experts report. [Read More]
The Fireball malware detailed early this month might not have have had as much impact as originally reported, Microsoft claims. [Read More]
The Necurs spam botnet has switched back to distributing the Locky ransomware in a campaign featuring messages disguised as fake invoices, Cisco Talos security researchers reveal. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Jack Danahy's picture
The impact of ransomware has expanded from an IT nuisance to attacks that can shut down and potentially ruin the businesses they infect.
Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?