Viruses & Malware

E1dfbe313b63976d1d9cdf7c31b343f3

OSX Ransomware Offered for Sale in the Underground

February 10, 2016 Added by:Idan Aharoni

Inteller has identified a new Ransomware malware being offered for sale in the underground, dubbed "GinX", which encrypts important and sensitive files on the victim's computer and which targets not only Windows operating systems, but MacBook's OSX as well.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

BlackEnergy Malware Used in Ukraine Power Grid Attacks: Report

January 05, 2016 Added by:Eduard Kovacs

Security firm ESET has been monitoring attacks involving the threat and recently discovered that the Trojan had been used to target news media and electrical power companies in Ukraine.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Elusive HanJuan EK Drops New Tinba Version (updated)

June 25, 2015 Added by:Malwarebytes

Dutch security firm Fox-IT has identified the payload as a new version of Tinba, a well-known banking piece of malware.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

VERT Vuln School: Return-Oriented Programming (ROP) 101

June 25, 2015 Added by:Tripwire Inc

In the beginning, there were stack buffer overflows everywhere.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

SAP Encryption Issues Pose Serious Risk to Organizations: Researchers

June 18, 2015 Added by:Eduard Kovacs

The use of static keys and other encryption issues expose numerous organizations that rely on SAP products to malicious hacker attacks, researchers have warned.

Comments  (0)

Bbd4f9420cc0edec55cb25411422efd2

Forget About IOCs… Start Thinking About IOPs!

June 10, 2015 Added by:Ronnie Tokazowski

For those who may have lost track of time, it’s 2015, and phishing is still a thing. Hackers are breaking into networks, stealing millions of dollars, and the current state of the Internet is pretty grim.

Comments  (0)

Bbd4f9420cc0edec55cb25411422efd2

Disrupting an Adware-serving Skype Botnet

June 08, 2015 Added by:Ronnie Tokazowski

In the early days of malware, we all remember analyzing samples of IRC botnets that were relatively simple, where the malware would connect to a random port running IRC, joining the botnet and waiting for commands from their leader. In this day and age, it’s slightly different.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Trust-Based Security Models Ineffective: Researchers

June 04, 2015 Added by:Eduard Kovacs

The trust-based foundations of whitelisting make it more difficult for organizations to properly protect their networks against cyber threats, Kaspersky Lab researchers have warned.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Tox: Free Ransomware Toolkit Hits the Black Market

June 04, 2015 Added by:Anthony M. Freed

Do-it-yourself malware toolkits have been available on the black market for a long time, but now researchers have discovered the first ransomware variation for creating your own extortion campaigns – and it’s free to use.

Comments  (0)

Default-avatar

Surfing the Dark Web: How Attackers Piece Together Partial Data

June 04, 2015 Added by:Aaron Higbee

There is an entire cottage industry of people who go to great lengths to upgrade partial data to make it more valuable. On the Dark Web, one can easily find postings buying and selling this kind of partial information.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Zero-Day Export Regulation Proposal Released for Public Comment

June 01, 2015 Added by:Anthony M. Freed

The U.S. Department of Commerce’s Bureau of Industry and Security (BIS) has released the proposal for regulatory control of the export of malware and zero-day exploits for a sixty-day public comment period, and the reaction from the security community and other interested parties is already definitively negative.

Comments  (0)

96f253cc8b3e78f1160a605fb9b56530

More Than Meets the Eye

May 28, 2015 Added by:Chris Elisan

The philosophy of hiding in plain sight has been used both by the good and the bad guys. But the effect of hiding in plain sight is much more pronounced when applied to a malicious attack.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Microsoft and the Software Lifecycle

May 25, 2015 Added by:Tripwire Inc

For some reason, Europe’s ‘The Final Countdown’ was playing in my head as I sat and pondered this write-up. I suppose that’s fitting given that we are about to cross the 60-day mark until Windows Server 2003 goes End-of-Life.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

More Possible Common Threads in Major ICS Cyber Incidents – Unintended System Interactions

May 25, 2015 Added by:Joe Weiss

One of the most important aspects in addressing ICS cyber security is the concept of “systems of systems”. Unlike IT where you can test a box and label it and the system secure, control system cyber security requires testing the overall system.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »