January 12, 2017 New PoC Exploit Weaponizes Security Research 2 min read - The authors of the Sundown exploit kit leveraged research conducted by Texas-based security firm Theori to develop a PoC exploit.
Application Security January 11, 2017 Don’t Let Remote Management Software Contribute to Building Botnets 4 min read - IT leaders must be vigilant when using remote management software. Attackers can exploit these tools to infect devices with malware and build botnets.
January 10, 2017 Botnet Phones Home Via Ghost Host 2 min read - Researchers disclosed a new method known as "ghost host," in which malware authors input false names in the HTTP host fields of a botnet's communications.
Malware January 10, 2017 Client Maximus: New Remote Overlay Malware Highlights Rising Malcode Sophistication in Brazil 7 min read - IBM X-Force researchers discovered a new malware called Client Maximus that contains advanced code written specifically to attack banks in Brazil.
January 9, 2017 Added DDoS Threat Makes FireCrypt Ransomware a Menace Worth Watching 2 min read - In additional to familiar malware processes, FireCrypt ransomware is capable of launching DDoS attacks after encrypting victims' files.
January 9, 2017 New Phishing Scam Uses Fraudulent PDF Files 2 min read - A security researcher disclosed a new phishing scam that prompts users to click a malicious link and enter login information to unlock a fraudulent PDF.
Advanced Threats January 4, 2017 Exposing an AV-Disabling Driver Just in Time for Lunch 8 min read - IBM X-Force researchers discovered a malicious AV-disabling driver while investigating a financial malware campaign targeting Brazilian bank accounts.
December 28, 2016 Burrowing Bad? Ransomworms Deepen Crypto-Ransomware Threats in 2017 2 min read - What's worse than ransomware? Ransomworms. Evolving crypto-ransomware techniques could wreak havoc on the IT security landscape in 2017.
Intelligence & Analytics December 23, 2016 Episode 004: The Twelve Days of Christmas 2 min read - The Every App team broke out in song to recap a year's worth of cybersecurity challenges in the latest edition of the "In Security" web comic.
December 22, 2016 Revised Mobile Banking Trojans Faketoken and Tordow 2.0 Threaten Customer Information and Business Integrity 2 min read - Banking Trojans already pose a huge threat to finance firms. Now, cybercriminals have added encryption capabilities to two existing ransomware campaigns.