Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The latest iteration of the Chrome browser ditches support for the FTP protocol and removes several features to improve security. [Read More]
CISA warns that the BlackMatter ransomware has targeted multiple critical infrastructure entities in the United States, including organizations in the food industry. [Read More]
Symantec is warning about a threat actor targeting multiple entities in South Asia, with a focus on Afghanistan - for data theft and cyberespionage. [Read More]
The ransomware uses a raw key and AES for encryption, which allowed Trustwave researchers to easily come up with a decryptor. [Read More]
The U.S. Treasury looked into 177 crypto wallets associated with ransomware, and a total of $5.2 billion in outgoing Bitcoin transactions made out of these wallets. [Read More]
In a Form 10-K filing with the SEC, the company confirmed that the attackers made some of the stolen data public. [Read More]
Over two dozen nations resolved Thursday to battle collectively against the global and escalating threat posed by cyber-extortionists, following a Washington-led anti-ransomware summit. [Read More]
FBI, CISA, EPA and NSA issue a joint advisory to warn organizations in the water and wastewater sector of attacks targeting IT and OT systems. [Read More]
With 6,000 out of 30,000 observed clusters of activity, GandCrab emerged as the most active ransomware family wreaking havoc on the Windows ecosystem. [Read More]
The botnet downloads and installs a Monero miner onto the compromised systems and is also capable of installing a rootkit and executing commands. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Derek Manky's picture
Botnets are becoming more malicious, sometimes able to create hundreds of thousands of drones that can attack a variety of machines, including Mac systems, Linux, Windows systems, edge devices, IoT devices, and so on.
Derek Manky's picture
How can organizations fight ransomware? The best solution is always prevention. Here are three tactics toward that goal.
Idan Aharoni's picture
The fact that so many large and high-profile enterprises fall prey to ransomware attacks that in many cases does not pose any new technical challenge suggests that there are still many gaps that needs to be closed.
Gordon Lawson's picture
Threat hunting must be non-attributable, while maintaining a clear audit trail to satisfy legal and governance requirements.
Derek Manky's picture
Each side of the public-private collaboration has resources and capabilities that shore up the other and increase effectiveness in combatting cybercrime.
Tim Bandos's picture
The ransomware threat could still become more pervasive over the next two to three years, not because ransomware is effective in and of itself but because of other players in the game continue to fan the flames.
Derek Manky's picture
2020 has taught us to revisit the practice of inspecting encrypted traffic. These are all standard security protocols to step up in light of what cybercriminals are doing now.
Joshua Goldfarb's picture
Playing whack-a-mole with malicious code infections, phishing sites, and compromised credentials won’t help an enterprise reduce losses due to fraud.
Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.