March 28, 2016 SHA-1 and SHA-2 Certificates Being Used by Malware to Avoid Detection 2 min read - Cybercriminals may be leveraging both SHA-1 and SHA-2 digital certificates to ensure their malware passes through systems undetected.
December 15, 2015 Google No Longer Trusts Symantec’s Root Certificate 2 min read - Google has recently announced it will not trust Symantec's new root certificate on Chrome, Android and other Google products.
December 3, 2015 Tech Support Scammers Spotted Using Ransomware 2 min read - In a troubling new development, some tech support scammers may have begun using ransomware tools to increase their chances of cashing in on schemes.
July 15, 2015 Butterfly Effect: Chaos Reigns, From Morpho to Wild Neutron 3 min read - Malware group Butterfly — once called Morpho and Wild Neuton — is after corporate IP. What are the risk factors, and how can companies protect their data?
May 14, 2015 Knock, Knock: New Ransomware Breaks In for Bitcoins 2 min read - Two new ransomware threats have surfaced in the last week, one identified by Symantec and the other by Rackspace. How can companies protect their data?
Advanced Threats March 10, 2015 Understanding Regin’s Plugin Framework: Part 2 7 min read - In the second part of this two-part series, IBM's Mark Yason discusses in more depth the Regin plugin framework hosted in the dispatcher module.
Advanced Threats February 10, 2015 Reviving the Regin Dispatcher Module: Part 1 6 min read - After reviving the Regin dispatcher module, Mark Yason ended up with a malware sample that was suitable for both static and dynamic analysis.