Security Experts:

long dotted


A new variant of the Ursnif trojan has been discovered targeting Japan since the beginning of 2019. [Read More]
New SLUB backdoor, used by threat actors in targeted attacks possibly aimed at South Korean users, abuses GitHub and Slack for C&C communications. [Read More]
Cybersecurity startup firm PolySwarm launched its malware detection marketplace based on blockchain contracts and virtual currency payments. [Read More]
Recent attacks against point-of-sale (PoS) thin clients around the world have been using card data scraping malware and the Cobalt Strike beacon, security firm Morphisec reveals. [Read More]
Over the past two years, a well known China-linked cyber-espionage group has used an array of tools and intrusion methods in attacks on political, technology, manufacturing, and humanitarian organizations, Secureworks reports. [Read More]
A recently discovered backdoor is used in attacks targeting victims in and around the South East Asia region, Palo Alto Networks security researchers warn. [Read More]
Security researchers have discovered that websites can abuse modern browser APIs to persistently abuse browser resources for nefarious operations even after their tabs or windows have been closed. [Read More]
Malicious hackers start exploiting a critical WinRAR vulnerability disclosed less than a week ago, just as RARLab releases the final version of the update that patches the flaw. [Read More]
A malicious campaign attempting to infect victims in the United States with a backdoor has been ongoing for over half a year, Proofpoint reports. [Read More]
The Drupal remote code execution vulnerability CVE-2019-6340 has been exploited in the wild to deliver cryptocurrency miners and other threats. [Read More]


rss icon

Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.