Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The VHD ransomware family that emerged earlier this year is the work of North Korea-linked threat actor Lazarus. [Read More]
North Korean-linked threat actor Lazarus has been employing at least four new Mac-targeting malware families in recent attacks. [Read More]
The United States and the United Kingdom warned in a joint alert issued this week that a piece of malware has infected over 62,000 QNAP NAS devices. [Read More]
In the past several days, a hacker managed to replace the payloads typically delivered by the Emotet Trojan with GIF images. [Read More]
Computer networks of Garmin were coming back online Monday after an outage widely believed to have been due to a ransomware attack. [Read More]
The FBI issued an alert to inform organizations in the United States of the risk associated with the use of Chinese tax software. [Read More]
Computer networks of smartwatch and electronics firm Garmin were offline July 24 in an incident which raised concerns of a ransomware attack affecting both its aviation and fitness app services. [Read More]
Kaspersky’s security researchers have identified a multi-platform malware framework that they believe North Korea-linked hackers have been leveraging in attacks over the past couple of years. [Read More]
A Chinese threat actor was observed earlier this month targeting victims in India and Hong Kong with a new variant of the MgBot malware. [Read More]
The Emotet Trojan has resumed activity after more than five months of absence from the threat landscape. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.