June 27, 2017 GhostHook Attack Reveals Kernel-Level Threat in 64-Bit Windows Systems 2 min read - Researchers discovered a haunting technique they're calling a GhostHook attack, which uses a feature in Intel CPUs to take over 64-bit Windows.
Data Protection June 27, 2017 Funny Money: Exploring the Connection Between Bitcoin and Ransomware 3 min read - Fraudsters obviously prefer to deal in digital currency to remain anonymous, but bitcoin and ransomware are also intertwined in other, more complex ways.
June 26, 2017 Fireball Malware: Ticking Time Bomb or All Hot Air? 2 min read - Depending on who you ask, the Fireball malware infected somewhere between 40 and 250 million Windows devices. The potential danger, however, is undisputed.
June 21, 2017 DVRs Prove IoT Malware Is Still Dangerous 2 min read - With its study of over 30 types of devices, U.K. security firm Pen Test Partners concluded that DVRs remain a major IoT malware platform.
Endpoint June 21, 2017 More Mobile Apps Means More Man-in-the-Middle Attacks 2 min read - Mobile devices that contain unsanctioned apps are particularly vulnerable to man-in-the-middle attacks, especially when connected to unsecured Wi-Fi.
June 20, 2017 Hidden PHP Rootkits Unearthed, Putting Apache Modules at Risk 2 min read - A security researcher discovered how to create malicious Apache modules, giving cyberattackers a new way to tap into and control web servers.
Malware June 20, 2017 TrickBot Spreads to the Nordics, Launches Redirection Attacks in France 5 min read - The TrickBot Trojan, which recently tested redirection attacks in France, expanded its list of targets to include banks in Sweden and other Nordic areas.
June 14, 2017 Attackers Leverage SambaCry Flaw to Run Cryptocurrency Miner 2 min read - Actors have exploited a patched flaw to push a cryptocurrency miner to vulnerable Linux machines. The attacks take advantage of a vulnerability in Samba.
June 13, 2017 Rotten Apples: MacSpy, MacRansom Bring Malware-as-a-Service Model to MacOS 2 min read - The first Mac malware-as-a-service threats suggests attackers are starting to see the operating system as a potential target.
June 13, 2017 New Linux Trojan Discovery Unveils Cryptomining in Raspberry Pi and Identity Cloaking Efforts 2 min read - Two new linux Trojan strains have been discovered: One attempts to mine cryptocurrency, while the other cloaks the threat actor's identity.