February 23, 2017 Researchers Find Clues in Windows Mirai Botnet Spreader Code 2 min read - Researchers analyzed the code of the Mirai botnet spreader that uses Windows systems as its launching pad to learn more about its origin and functionality.
February 16, 2017 GIT Researchers Sink SCADA Security With Proof-of-Concept Malware 2 min read - According to a new report, a team of researchers created proof-of-concept malware that poses a serious threat to SCADA and ICS systems.
Advanced Threats February 15, 2017 The Full Shamoon: How the Devastating Malware Was Inserted Into Networks 6 min read - X-Force IRIS researchers found that the Shamoon malware operators relied on weaponized documents that leveraged PowerShell to infiltrate targeted networks.
February 14, 2017 Lazarus-Linked Malware Targets Polish Banks 2 min read - Threat actors with apparent ties to the Lazarus cybergang launched an attack against Polish banks that may be part of a broader, global campaign.
February 9, 2017 Mirai Malware Leverages Windows 2 min read - Security researchers discovered a Windows Trojan that spreads Mirai malware, identifies potential victims and provides an extra boost of processing power.
February 2, 2017 Malvertising Grows by 132 Percent, According to Report 2 min read - The rate of malvertising attacks increased by 132 percent in 2016, according to a recent report. The use of ad-blocking software also increased sharply.
Advanced Threats October 16, 2015 What Is Polymorphic Malware and Why Should I Care? 2 min read - Polymorphic malware may be a serious threat, but some of the strategies used to create it could be applied to malware defenses, as well.
Malware June 4, 2015 Detecting and Analyzing Kernel-Based Malware 3 min read - The intricacies of kernel-based malware make it difficult for security teams to identify potential problems, but the task is not impossible.
Endpoint March 10, 2015 Protecting the Endpoint Against Advanced Malware and Zero-Day Threats 3 min read - While network-based security solutions provide protection for an enterprise's network, endpoint protection is needed to effectively combat advanced malware
Banking & Finance November 19, 2014 Cybercriminals Use Citadel to Compromise Password Management and Authentication Solutions 5 min read - According to IBM Trusteer researchers, there is a new type of Citadel malware that is compromising password management and authentication solutions.