December 10, 2019 Lazarus Group Targets macOS Users With Fileless Malware Threat 2 min read - MacOS computer users are being targeted by the Lazarus hacker collective with fileless malware that's designed to resemble a cryptocurrency trading app.
October 14, 2019 New BitPaymer Ransomware Campaign Exploits Apple Zero-Day Vulnerability 2 min read - Researchers detected a new BitPaymer ransomware campaign that exploited an Apple zero-day vulnerability to target Windows users.
Intelligence & Analytics September 26, 2019 How Analysts Connect Threat Intelligence Sources to Make Investigations More Efficient 3 min read - Organizations in the private sector are adopting link analysis tools that automatically gather disparate sources of threat intelligence on a single pane of glass.
Incident Response September 12, 2019 5 Things You Can Do After a Data Breach to Help Mitigate Cost 5 min read - The cost of a data breach is rising, and a carefully planned and regularly rehearsed response can go a long way toward saving your company money in the wake of a security incident.
September 4, 2019 Attackers Distribute Sodinokibi Ransomware Via Fake Forums on Compromised Sites 2 min read - Attackers leveraged fake forum posts on compromised websites to distribute samples of the Sodinokibi ransomware family.
Incident Response April 9, 2019 Credential Dumping Campaign Hits Multinational Corporations 6 min read - X-Force researchers observed attackers targeting multinational corporations in various sectors using malicious scripts to automate attacks on misconfigured servers.
January 14, 2019 University of Maryland Researchers Use Audio Files and AI to Defeat reCaptcha Challenges 2 min read - University of Maryland researchers warn that with limited resources, threat actors could launch a successful cyberattack on Google's bot-detecting reCaptcha service.
August 23, 2018 Ramnit Infects More Than 100,000 Machines in Two Months 2 min read - A new campaign involving the Ramnit botnet that infected 100,000 computers over a two-month period may foreshadow an even larger attack, researchers warn.
Incident Response July 19, 2018 Why the Best Defense Is a Good Offensive Security Strategy 2 min read - Offensive security activities like cyberattack simulations, penetration testing and vulnerability assessments can help companies identify and remediate flaws before cybercriminals can exploit them.
Network May 8, 2018 Reflecting on the Memcached Reflection Attacks: A Wake-Up Call for Developers 3 min read - The memcached vulnerability isn't new, but attackers exploited it in late February to launch what might be the largest DDoS attack on record.