August 31, 2017 Defray Ransomware Tries Going Vertical 2 min read - A new Defray ransomware variant attacks specific verticals in two separate campaigns: health care and education, and manufacturing and technology.
Advanced Threats August 21, 2017 All in a Spammer’s Workweek: Where Do the Busiest Spammers Work Around the Clock? 5 min read - According to recent IBM X-Force data, spammers and spam botnets typically work the same hours we do to maximize their returns.
August 7, 2017 Typosquatting Attack Puts Developers at Risk From Infected JavaScript Packages 2 min read - Investigations by npm, a Node.js management registry, revealed that an errant attacker uploaded 38 malicious JavaScript packages on the repository.
August 7, 2017 Cerber Ransomware Now Steals Bitcoin Data 2 min read - A Cerber ransomware update adds new exploits, which allows it to steal wallet files. It then tries to steal saved passwords from browsers.
Threat Hunting August 7, 2017 Threat Hunting Services Are Now a Basic Necessity 4 min read - EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
Fraud Protection August 7, 2017 Ransomware, Trojans and Fraud, Oh My! Tracking Recent Cybercrime Trends and Patterns 4 min read - As banking and retail institutions adopt stronger security measures, cybercrime trends are shifting to maximize fraudsters' ROI.
July 25, 2017 Splash Screens Elicit Scares, According to New Ransomware Study 2 min read - A new ransomware study found that splash screens are being used to manipulate users through social engineering and scare tactics.
July 24, 2017 Cybersecurity Threats Create Growing Risk of Destruction of Service 2 min read - As dangerous attacks evolve, IT teams must proactively combat cybersecurity threats and decrease the time to detection within their networks.
July 24, 2017 Rapid Revision: New CryptoMix Strains Picking Up Speed 2 min read - New variants of CryptoMix malware are quickly making the rounds, holding files ransom and demanding victims fork over the bitcoin.
Intelligence & Analytics July 19, 2017 Monitor Your Network for NotPetya in Real Time 3 min read - With the QRadar NotPetya Content Pack, security analysts can monitor their networks for indicators of NotPetya ransomware in real time.