Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Check Point security researchers have warned that tactics employed by a mobile Trojan (Swearing Trojan) targeting users in China might become a worldwide threat when adopted by Western malware. [Read More]
New study from Dragos shows that non-targeted malware hits roughly 3,000 unique industrial sites a year and targeted ICS attacks are not so rare [Read More]
A newly discovered piece of ransomware that features a Star Trek-theme targets 625 file types and demands the ransom be paid in Monero, security researchers have discovered. [Read More]
A series "fileless attacks" previously attributed to two different threat attackers are now believed to have been carried out by the same actor, researchers say. [Read More]
Newly observed ransomware campaigns are leveraging installer files from the Nullsoft Scriptable Install System (NSIS) to hide malicious code, Microsoft says. [Read More]
New Trojan dubbed Acronym is possibly linked to the malware family used in the Potao Express campaign [Read More]
Newly discovered "MajikPOS" point-of-sale (PoS) malware features a modular approach in execution is currently targeting businesses in North America. [Read More]
A newly observed ransomware family is leveraging the well-known Petya ransomware to encrypt user data, but modifies the malware “on the fly” to control its execution, Kaspersky Lab researchers discovered. [Read More]
macOS users who had their systems infected with the FindZip ransomware can now use a decryption tool to restore their files without paying the ransom. [Read More]
A recent spam campaign impersonating UK-based banking giant HSBC is attempting to distribute malware masquerading as a fake security application, Symantec researchers warn. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Jack Danahy's picture
Identifying malicious software by recognizing that it just damaged the system or exfiltrated some amount of information is no longer defense, but detection.
Adam Meyer's picture
While malicious actors demanding ransoms is not new, the surge of organizations being targeted with fake extortion demands and empty threats is. Let’s look at how extortion campaigns are carried out through the “avenue of approach” lens.
Jack Danahy's picture
Protection against the effects of ransomware starts with a clear understanding of all of the means that attackers will use to implant that first malicious package.
Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Jack Danahy's picture
The impact of ransomware has expanded from an IT nuisance to attacks that can shut down and potentially ruin the businesses they infect.
Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.