Security Experts:

long dotted


Researchers spot first Android malware to exploit a recently patched Toast vulnerability [Read More]
CIA source code files published by WikiLeaks as part of the Vault 8 leak appear to show that the intelligence agency impersonated Kaspersky Lab [Read More]
The cyber espionage group known as "Tick" is using steganography to conceal their backdoor Trojan better, according to analysis from security firm Trend Micro. [Read More]
Russia-linked cyber espionage group APT28 (Fancy Bear) delivers malware using recently disclosed technique involving Microsoft Office files and DDE [Read More]
Vietnam-linked cyberespionage group known as OceanLotus and APT32 rivals the notorious Russian group Turla in sophistication [Read More]
A newly discovered ransomware family is targeting all files on machines that it has managed to infect, except those located in the Windows folder. [Read More]
The Quackbot and Emotet information stealing Trojans have been increasingly targeting enterprises, small and medium businesses, and other organizations, Microsoft says. [Read More]
A recently observed Zeus Panda banking Trojan attack used poisoned Google search results for specific banking related keywords to infect users, Cisco Talos researchers warn. [Read More]
Ethereum-mining farms are at the receiving end of an attack involving a hijacker that simply attempts to replace the user’s wallet with an unknown actor’s. [Read More]
Cybercriminals using the Silence Trojan are sending spear-phishing emails as initial infection vectors, often using the addresses of employees of an already infected financial institution. [Read More]


rss icon

Adam Meyer's picture
While malicious actors demanding ransoms is not new, the surge of organizations being targeted with fake extortion demands and empty threats is. Let’s look at how extortion campaigns are carried out through the “avenue of approach” lens.
Jack Danahy's picture
Protection against the effects of ransomware starts with a clear understanding of all of the means that attackers will use to implant that first malicious package.
Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Jack Danahy's picture
The impact of ransomware has expanded from an IT nuisance to attacks that can shut down and potentially ruin the businesses they infect.
Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.