Security Experts:

Virus & Malware
long dotted


A group of China-linked hackers used a UEFI bootkit based on code from Hacking Team in attacks on organizations interested in North Korea. [Read More]
A North American merchant’s point-of-sale (POS) terminals were infected with a mix of POS malware earlier this year, Visa reports. [Read More]
The DoD and the DHS have warned organizations of attacks involving what they have described as a new malware variant named SLOTHFULMEDIA. [Read More]
Facebook on Thursday released a detailed technical report on a malware campaign that targeted its ad platform for years. [Read More]
The China-linked BlackTech cyber-spies have adopted new malicious tools in recent attacks and they have started targeting the United States. [Read More]
Human rights organization Amnesty International has identified new macOS and Linux-targeting variants of the infamous FinFisher-made spyware family FinSpy. [Read More]
Microsoft this week announced that it recently removed 18 Azure Active Directory applications that were being abused by China-linked state-sponsored threat actor GADOLINIUM. [Read More]
The COVID-19 pandemic has apparently resulted in a rise in ICS being targeted via brute-force attacks on RDP passwords, Kaspersky reported. [Read More]
A hacking group made up of Russian speakers is targeting organizations in Russia and post-Soviet countries with ransomware. [Read More]
Microsoft says it has observed threat actors actively targeting the Zerologon vulnerability affecting Windows Server. [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...