July 14, 2016 Furtim’s Parent Goes After Power Companies 2 min read - Power companies should watch out for Furtim's Parent, a suspected state-sponsored malware variant currently targeting this high-profile industry.
Advanced Threats July 13, 2016 CryptoLocker Ransomware Is on the Rise — Here’s What to Do if You’re Attacked 2 min read - The popularity of threats such as the CryptoLocker ransomware highlights some security best practices that can help enterprises avoid attacks.
July 12, 2016 Patchwork Problems: Copy-Pasted Code Creates New APT Threat 2 min read - Old copied-and-pasted code is enjoying a rejuvenation in the form of Patchwork, a malware that's making the most of its second chance.
July 12, 2016 New UK Cybercrime Report: Traditional Lawbreakers Trounced by Tech Thieves 2 min read - According to a new cybercrime report from the U.K.'s National Crime Agency, digitally enabled fraud and computer misuse now outstrip traditional crime.
July 12, 2016 CryptoDrop Stops Ransomware by Stopping Its Encryption 2 min read - A new security tool called CryptoDrop aims to flag malicious encryption processes to stop a ransomware infection from being completed.
July 11, 2016 Firefox Malware Poses as Browser Update 2 min read - A security firm recently reported on a Firefox malware that tricks users into downloading it by disguising itself as a harmless browser update.
Malware July 8, 2016 GootKit: Bobbing and Weaving to Avoid Prying Eyes 7 min read - IBM X-Force researchers recently studied the GootKit banking Trojan — and the many ways it effectively evades detection and maintains persistence.
July 7, 2016 Zepto: Is the ‘New Locky’ Putting Users on Notice? 2 min read - Zepto is a new ransomware that's following in Locky's footsteps, but it is adding a large dose of fear as it wreaks havoc on users.
July 6, 2016 Out of the Office? Not Quite — Old Microsoft Vulnerabilities Still Wreaking Havoc 2 min read - A series of old Microsoft vulnerabilities continues to cause problems in Microsoft Office products. Here's what users need to know.
June 28, 2016 Nuclear EK Shuts Down — What’s the Fallout? 2 min read - Now that both Angler and the Nuclear EK have been shut down, cybercriminals will have to search for a replacement to carry out their attacks.