Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Industry professionals react to WannaCry ransomware attacks, including ICS, insurance, legal, cybersecurity strategy and attribution aspects of the story [Read More]
Hackers breached DocuSign systems and stole email addresses, which they used in a spam campaign designed to deliver malware [Read More]
Experts and vendors warn that industrial control systems (ICS) are also at risk of getting hit by WannaCry ransomware attacks [Read More]
After researchers managed to stop the recent WannaCry ransomware outbreak by registering domains that function as kill-switches, a variant of the malware that no longer uses this function has emerged. [Read More]
Microsoft warned governments against exploit stockpiling, following the global WannaCrypt ransomware attack that started on May 12. [Read More]
In response to a massive ransomware outbreak Microsoft took the highly unusual step of providing a security update for those using Windows XP, Windows 8, and Windows Server 2003. [Read More]
WannaCry ransomware struck state agencies and major companies around the world -- from Russian banks and British hospitals to FedEx and European car factories. [Read More]
Security experts expressed alarm Friday over a fast-moving wave of cyberattacks around the world that appeared to exploit a flaw exposed in documents leaked from the US National Security Agency. [Read More]
Jaff is brand new ransomware family is currently distributed via Necurs, the botnet behind Locky and Dridex campaigns over the past year. [Read More]
The GootKit banking malware has joined the growing band of advanced financial trojans that have migrated from web-injections to redirection attacks. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.