Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Terdot banking Trojan packs information-stealing capabilities that could easily turn it into a cyber-espionage tool [Read More]
Kaspersky shares more details from its investigation into reports that Russian hackers stole NSA data using its software [Read More]
A newly discovered multi-stage Android malware that managed to sneak into Google Play is using advanced anti-detection features, ESET security researchers reveal. [Read More]
Forever 21 investigating payment card breach, but only few details were provided by the company [Read More]
The United States Department of Homeland Security (DHS) shared details of hacking tools they say are being used by a hacking group linked to the North Korean government known as “Hidden Cobra.” [Read More]
A newly discovered banking Trojan called IcedID packs a modular design and modern capabilities when compared to older financial threats, IBM X-Force warns. [Read More]
Following an increase in Android malware and adware abusing accessibility services, Google decides to crack down on apps that misuse the feature [Read More]
New malware used by Chinese cyberspies in highly targeted attacks is delivered via Windows Control Panel (CPL) files [Read More]
A complaint by Enigma Software against security firm Malwarebytes was dismissed by the District Court, Northern District of California, San Jose Division on November 7, 2017. [Read More]
Account takeover study conducted by Google shows that phishing poses the greatest threat to users, followed by keyloggers and third-party breaches [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.
Scott Simkin's picture
When implemented in series, common malware analysis environments allow security teams to handle the vast majority of threats automatically, freeing up team resources to actively hunt more advanced threats.
Scott Simkin's picture
When implemented as part of a natively-engineered security platform, these malware identification and prevention practices can reduce the operational burden put on security teams.
Jack Danahy's picture
Identifying malicious software by recognizing that it just damaged the system or exfiltrated some amount of information is no longer defense, but detection.