Researchers from Arbor Networks’ Security Engineering and Response Team (ASERT) say they have unearthed fresh leads on the tools and techniques used in the most recent wave of Shamoon attacks.
Browsing Category: Malware
By making the Vulnerability Equities Process law, advocates of the idea argue there would be more reliability, transparency and accountability in the process of government vulnerability disclosure.
After a nearly four-year respite, the data-stealing TeamSpy malware has resurfaced in a spam campaign.
Mat Gangwer, CTO, and Tom Gorup, Security Operations Lead, at Rook Security talk to Mike Mimoso about the aggressive rise in online extortion and how it threatens not only data but physical safety.
A RSA Conference panel tackles the difficulty in defining cyberwar.
Google’s Android security director touts 2016 mobile OS security accomplishments from encryption, improved APIs and new developer testing tools at the RSA Conference.
Increasingly, governments are outsourcing state-sponsored attacks to mitigate risk and maximize intelligence.
RSA 2017 is previewed and last week’s report on iOS apps being vulnerable to interception attacks, macro malware coming to MacOS, and new Uber open source module are discussed.
Researchers have spotted an increase in CryptoShield ransomware infections coming from the RIG Exploit Kit used by EITest delivery campaigns.
Attackers have been using fileless malware to hide in the memory of enterprises, steal data, and vanish without a trace.