Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cloud software provider Blackbaud has admitted that it paid cybercriminals to regain control of data following a ransomware attack in May 2020. [Read More]
Developers continue to improve the Mac malware named ThiefQuest and researchers noticed that the latest versions no longer include ransomware functionality. [Read More]
Security researchers at ESET have identified a new campaign targeting Mac users with trojanized cryptocurrency trading apps designed to deliver the GMERA malware. [Read More]
A total of 7 ransomware families have been found to target industrial applications, including CLOP, which targets at least 150 OT processes. [Read More]
The Brazilian cybercriminals behind four banking Trojans collectively dubbed “Tetrade” have decided to expand their business and started targeting victims internationally. [Read More]
Trustwave’s security researchers have discovered another malware family delivered through tax software that Chinese banks require companies doing business in the country to use. [Read More]
A newly identified version of the Mirai Internet of Things (IoT) botnet includes an exploit for a vulnerability impacting Comtrend routers. [Read More]
Honeywell has seen a significant increase in USB-borne malware that can cause major disruption to industrial control systems (ICS). [Read More]
Following a January report on malware found pre-installed on smartphones sold in the United States to budget-conscious users, Malwarebytes has discovered another mobile device riddled with malware from the get-go. [Read More]
A new ransomware family packs multiple unique features, including to improve performance and give its operators the option to only target networked SMB shares. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.
David Holmes's picture
Take a step back and realize that cryptocurrency mining is really just another form of malware, which is something you should be good at finding already.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.