For companies that want to understand what is happening in their networks but lack malware analysis tools, using what is publicly available could be the difference between an infection and a crisis.
Security researchers observed threat actors using a Delphi packer to shield their binaries from malware classification by antivirus and other detection tools.
Endpoint detection and antiphishing tools can help users filter basic spam email, but detecting malspam in PDF and Microsoft Office documents requires a more thorough investigation.
Analysts can improve and automate their incident response processes by adopting the right malware classification scheme according to specific threat management goals.
A popular fast-food chain and supermarket were recently breached by POS malware. Some of the credit card details had been up for sale for more than a week.
A public malware sandbox can be a great substitute for an in-house malware analysis solution — as long as you understand its limitations.
IBM X-Force Red marked its first anniversary with the addition of security specialists, including Space Rogue, bolstering the team's talent roster.
Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.
Organizations across a range of industries are being targeted in a sophisticated campaign that uses malware to put critical information at risk.
A malware simulator like the Shinosec ShinoLocker suite can help penetration testers understand how malware works and practice defending their systems.