Security Experts:

long dotted


A North Korea-linked hacker group tracked as ScarCruft, APT37 and Group123 continues to evolve and it recently added a Bluetooth harvester to its toolkit. [Read More]
Microsoft SharePoint vulnerability patched earlier this year (CVE-2019-0604) has been exploited in the wild to deliver the China Chopper web shell. [Read More]
DHS announces a new report detailing a piece of malware named ELECTRICFISH that North Korea’s Hidden Cobra (Lazarus) hackers use to tunnel traffic. [Read More]
Global information services giant Wolters Kluwer takes applications and platforms offline after discovering malware on its systems. [Read More]
Sophos security researchers have observed a spike in the number of attacks featuring a new ransomware family called MegaCortex. [Read More]
A Jenkins vulnerability disclosed late last year has been exploited by hackers to deliver malware that deploys a Monero miner and looks for new victims on the internet and local network. [Read More]
Baltimore’s government on Tuesday rushed to shut down most of its computer servers after its network was hit by a ransomware virus. Officials believe it has not touched critical public safety systems. [Read More]
The Russia-linked threat group known as Turla has been using a sophisticated backdoor dubbed LightNeuron to hijack Microsoft Exchange mail servers. [Read More]
GandCrab, once known as a consumer-targeting ransomware, is increasingly being used in attacks against business organizations [Read More]
The Chinese threat actor known as APT3, Gothic Panda and Buckeye used a newer version of a tool from the NSA-linked Equation Group at least a year prior to the Shadow Brokers leak. [Read More]


rss icon

Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.