November 17, 2016 RIG-E Exploit Kit Delivers New CryptoLuck Ransomware 2 min read - The recently discovered CryptoLuck ransomware is distributed by the RIG-E exploit kit, suggesting that it may target a large pool of victims.
November 17, 2016 Uninvited Guest? Carbanak Malware Hacks Hospitality Market 2 min read - The Carbanak gang redesigned its flagship malware to target restaurants and hotels by tricking call center agents into clicking malicious email links.
November 15, 2016 Researchers Try to Create Malware Chip 2 min read - The NSF is sponsoring an attempt to build a malware chip capable of detecting anomalies in system processes and alerting local security software.
November 9, 2016 Exaspy Spyware Is Available as a Service 2 min read - Exaspy spyware, which infects Android phones to intercept text messages, emails and other communications, is available as a commodity service online.
Advanced Threats November 9, 2016 Tricks of the Trade: A Deeper Look Into TrickBot’s Machinations 6 min read - Researchers discovered a new banking Trojan, TrickBot, that appears to borrow an uncommon webinjection technique from the infamous Dyre family of malware.
Malware November 8, 2016 An Aggressive Launch: TrickBot Trojan Rises With Redirection Attacks in the UK 3 min read - IBM X-Force researchers reported that TrickBot is fully operational and already capable of deploying two of the most advanced browser manipulation methods.
Threat Intelligence November 8, 2016 Consequences of IoT and Telnet: Foresight Is Better Than Hindsight 4 min read - Cybercriminals have learned how to exploit the IoT and Telnet servers to commit record-shattering DDoS attacks against major websites.
November 7, 2016 Ponemon Reports Threat Intelligence Overloads 2 min read - A threat intelligence program requires a strong platform and a reliable threat analyst to make sense of the data that might overwhelm regular IT employees.
Intelligence & Analytics November 4, 2016 It Only Has to Happen Once: Protecting Your Brand in the Digital Age 4 min read - The challenge of protecting your brand is growing as ransomware and other targeted attacks become increasingly frequent and complex.
November 3, 2016 Sundown Exploit Kit Poised for Growth 2 min read - With heavyweight exploit kits like Nuclear, Angler and Neutrino out of the picture, the Sundown exploit kit appears poised for growth in the near future.