Advanced Threats April 7, 2016 Unraveling ZeuS.Maple’s Stealth Loader 5 min read - ZeuS.Maple is a relatively new variant of a stealth loader that enables a few tricks to stay under the radar of security researchers and tools.
April 6, 2016 Locky Variant Changes Communications and Spreads With the Nuclear EK 2 min read - A new Locky variant has made enough changes to avoid detection by some cybersecurity tools and fool users into becoming victims.
March 30, 2016 Bill of Health? Ransomware Industry Targeted by New PC Vaccines 2 min read - Security companies are attempting to curb the surging ransomware industry with the help of cyber vaccines for the most serious infections.
Advanced Threats March 30, 2016 The Silver Lining of a Ransomware Infection 4 min read - If you need a silver lining, think of a ransomware event as a low-cost security assessment pointing out weaknesses in your organization's environment.
March 30, 2016 Ransomware Ramp-Up: Boot Processes, PowerShell Under Attack 2 min read - Organizations are still being plagued by ransomware, and cybercriminals have conjured up more variants that could be dangerous.
March 28, 2016 SHA-1 and SHA-2 Certificates Being Used by Malware to Avoid Detection 2 min read - Cybercriminals may be leveraging both SHA-1 and SHA-2 digital certificates to ensure their malware passes through systems undetected.
March 28, 2016 Bad Bots Report Predicts Smaller Footprint, Bigger Kick 2 min read - Although a recent report found that the number of bad bots is shrinking, the bots are getting more sophisticated and damaging.
March 22, 2016 Singapore: An Emerging Target for Cyberthreats and Banking Trojans 4 min read - It is no coincidence that threats target Singapore, one of Asia's most advanced countries in digital banking with the highest variety of digital offerings.
Threat Intelligence March 22, 2016 Living in the Past: Business Encryption Needs to Get With the Times or Get Hacked 2 min read - Now that the vulnerabilities of numerous encryption standards have been laid bare, it's only a matter of time before organizations are targeted.
March 21, 2016 Mightier Than the Sword? Pen Testing Tools Used as Ransomware Delivery Device 2 min read - Cybercriminals are leveraging pen testing tools and white-hat best practices to deliver advanced ransomware that has longer life spans and bigger payouts.