Tag: Malware Detection
-
Kwampirs threat actor continues to breach transnational healthcare orgs
The Kwampirs (aka Orangeworm) attack group continues to target global healthcare entities in this time of crisis, the FBI has warned. …
-
Evasive malware increasing, evading signature-based antivirus solutions
Evasive malware has grown to record high levels, with over two-thirds of malware detected by WatchGuard in Q4 2019 evading signature-based …
-
Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises
Cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as …
-
5 Keys to Improve Your Cybersecurity
Cybersecurity isn’t easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity …
-
Cybercriminals are becoming more methodical and adaptive
Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social …
-
Researchers unveil February 2019’s most wanted malware
Coinhive has once again led Check Point’s Global Threat Index for the 15th consecutive month, despite the announcement that its services …
-
The NSA Just Released Their Reverse-Engineering Platform to the World
Photo credit Flickr/Christoph Scholz The National Security Agency’s newest contribution to the open source community is here. Unveiled at …
-
Mining malware evades agent-based cloud security solutions
Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them …
-
Endpoint security solutions challenged by zero-day and fileless attacks
There is an endpoint protection gap against modern threats, the result of a recent survey by the Ponemon Institute and Barkly have shown. …
-
Researchers Release Free TRITON/TRISIS Malware Detection Tools
BLACK HAT USA – Las Vegas – A team of ICS experts who spent the past year studying and recreating the so-called TRITON/TRISIS malware that …
-
Underground vendors can reliably obtain code signing certificates from CAs
More and more malware authors are switching to buying new, valid code signing certificates issued by Certificate Authorities instead of …
●●●