March 21, 2016 Mightier Than the Sword? Pen Testing Tools Used as Ransomware Delivery Device 2 min read - Cybercriminals are leveraging pen testing tools and white-hat best practices to deliver advanced ransomware that has longer life spans and bigger payouts.
March 18, 2016 TeslaCrypt Ransomware 3.0.1 No Longer Leaves Keys Around to Sniff 2 min read - TeslaCrypt ransomware 3.0.1 is an improvement over previous versions, making the malware highly resistant to decryption efforts.
Mainframe March 16, 2016 Evolving Threats: Why Deep Packet Inspection Is Critical for Intrusion Prevention 3 min read - Traditional approaches to intrusion prevention are not as effective as they once were, and deep packet inspection is an attractive modern option.
Intelligence & Analytics March 15, 2016 Cybersecurity Checkup: Tell Us Where It Hurts 2 min read - Have you ever noticed that your company's cybersecurity system is very much like an immune system? They both strengthen your defenses against threats.
March 14, 2016 Research Finds Libotr Can Be Exploited Remotely 2 min read - Researchers recently discovered that libotr is vulnerable, so secure instant messaging apps such as Pidgin, ChatSecure, Adium and others are at risk.
March 14, 2016 Locky Sends You an Invoice and Makes You Pay 3 min read - The recently discovered Locky ransomware encrypts data using AES encryption and then demands hundreds of dollars. Here's what you need to know.
Advanced Threats March 8, 2016 Ransomware Takes a Scary Turn Using JavaScript 2 min read - A relatively new type of ransomware called Ransom32 is leveraging JavaScript to bypass detection tools and infect computer systems.
March 3, 2016 New PHP Ransomware Looks to Websites for Windfall 2 min read - PHP ransomware is enabling cybercriminals to take over entire Web pages and broadcast their exploits to the masses, bringing in major paydays.
February 18, 2016 Locky Ransomware: Cute Name, Ugly Consequences? 2 min read - A new ransomware called Locky is the latest macro malware to attack unsuspecting users in an attempt to encrypt files and extort money.
February 11, 2016 Logical Consequences: Siemens Plugs High-Severity PLC Gaps 2 min read - Siemens recently came under fire for high-severity vulnerabilities in some of its PLCs, highlighting a broader problem with IoT.