November 30, 2018 Brand New Bag? TrickBot Malware Adds POS Data Collection Module 2 min read - Security researchers observed TrickBot malware that utilizes a new capability: point-of-sale (POS) data collection.
November 12, 2018 New Ransomware Strain Evades Detection by All but One Antivirus Engine 2 min read - A new strain of Dharma ransomware is able to evade detection by nearly all of the antivirus solutions on the market.
November 12, 2018 New Cobalt Gang PDF Attack Avoids Traditional Static Analysis Tools 2 min read - A PDF attack campaign conducted by the Cobalt Gang used a specially crafted document to evade dection by static analysis tools.
Application Security October 30, 2018 How SEO Poisoning Campaigns Are Mounting a Comeback 3 min read - SEO poisoning is on the rise again. How do threat actors use search engine results to drive victims to malicious sites, and what can users do to protect themselves?
September 28, 2018 Partnerstroka Tech Support Scam Preys on Users With New Browser Locking Tactic 2 min read - Researchers discovered a large tech support scam operation called Partnerstroka that preyed on unsuspecting users with an innovative browser locking technique.
August 21, 2018 New Ransomware Family Appends ‘.Armage’ to Encrypted Files 2 min read - Researchers from Quick Heal Security Labs discovered a new family of ransomware that spreads via spam emails and appends the extension ".Armage" to all files it encrypts.
Endpoint December 7, 2017 When Legacy Tools Fail, Next-Generation Antivirus Solutions Can Defuse Endpoint Security Risks 5 min read - Legacy antivirus tools require more resources to operate and are less effective than next-generation solutions at defusing endpoint security risks.
September 19, 2017 Security Utility Abuses Supply Chain for a Malware Attack 2 min read - CCleaner was compromised at the main distribution site to include a malware attack. The Floxif attack is a downloader that breached the app supply chain.
August 22, 2017 Is Antivirus Protection Still Relevant? 2 min read - A survey of Black Hat attendees showed that many security experts doubt the ability of antivirus protection products to detect ransomware.
July 24, 2017 More Than 500,000 Systems Infected by Stantinko Malware Since 2012 2 min read - Stantinko malware uses Teddy Protection and The Safe Surfing Chrome extensions to commandeer affected PCs. This sophisticated design can execute any code.