Security Experts:

long dotted


Sepio Systems, which helps defend against the threat of rogue hardware, has raised $6.5 million in Series A funding. [Read More]
A new exploit kit named Capesand is being employed in live attacks despite still being in an unfinished state. [Read More]
The cyber threat actor known as DarkUniverse has been creating new malware samples just before delivering them to victims, Kaspersky Lab reports. [Read More]
The notorious Windows RDS vulnerability named BlueKeep has been exploited to deliver a Monero cryptocurrency miner. [Read More]
Google patches Chrome zero-day vulnerability that has been exploited to deliver malware in attacks sharing similarities with previous Korea-linked attacks. [Read More]
The China-linked threat group APT41 has been using a new piece of malware named MESSAGETAP to intercept SMS traffic on the servers of mobile operators. [Read More]
India’s largest nuclear power plant was reportedly hit by a piece of malware that has been linked to North Korean hackers. [Read More]
Fortinet security researchers took a deep dive into NukeSped malware samples that share multiple similarities with other malware families used by North Korean threat actors. [Read More]
A total of 17 iOS applications infected with clicker Trojan malware made it into the Apple App Store. [Read More]
German automation firm Pilz took many systems offline after it was hit by what it described as a targeted cyberattack, with reports claiming it was a ransomware attack. [Read More]


rss icon

John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.