A new, free decryptor has been released for "aggressive" crypto-locking ransomware called GandCrab. Researchers say GandCrab has come to dominate the ransomware-as-a-service market, earning its development team an estimated $120,000 per month.
A slick ransomware-as-a-service operation called Kraken Cryptor has begun leveraging the Fallout exploit kit to help it score fresh victims, researchers from McAfee and Recorded Future warn. Absent offline backups, victims have little chance of recovering from its crypto-locking attacks.
Malware continues to routinely evades organizations' cyber defenses. It lurks inside networks waiting to execute attacks that can cause significant damage. Automated Static Analysis of binary files enables security teams to unlock an array of new threat intelligence, hunting, analysis, and rapid response...
The lack of visibility into your organization's network means threat hunters cannot adequately identify undetected malware.
Download this whitepaper to learn how automated static analysis technology provides a unique ability to create local file intelligence with the tools to identify and neutralize undetected...
The notorious GandCrab ransomware-as-a-service gang has released the latest version of its crypto-locking malware, backed by crypter service and exploit toolkit partnerships. But the gang's marketing savvy belies shoddy code-development practices, security firm McAfee finds.
More evidence that running cybercrime schemes remains inexpensive and accessible to anyone with criminal intent: To send spam emails, admitted botnet herder Peter Levashov quoted customers $500 for 1 million emails. And that was just his 2016 pricing.
Russian national Peter Levashov, who was arrested in Spain last year and extradited to the U.S., has admitted to a two-decade crime spree that included running multiple botnets that harvested online credentials while also pumping out spam, banking Trojans and ransomware.
This quarter's finds uncover some very interesting cyber security trends and examples of malware developers, leveraging agile development, IoT devices used for cryptojacking, and vulnerability exploitation.
Learn more about the threat intelligence behind this report and how you can prevent cyberattacks in your...
Malware detection needs to shift to detecting anomalous behavior, rather than depending on signature-based detection technologies to deal with such threats as sandbox-evading malware, says Verizon's Ashish Thapar.
An analysis of the privacy issues Amazon will face as it dives deeper into the healthcare business leads the latest edition of the ISMG Security Report. Also featured: A preview of ISMG's Security Summit in New York Aug. 14-15.
Much of the attention around Chinese hacking is directed toward advanced threat groups suspected to have links to China's government. But a new report shows that the nation's hacking goes far deeper, and there's a thriving scene that has adapted to an internet heavily controlled by the government.
Bot technology is becoming increasingly sophisticated and bot traffic right now makes up more than 50% of all internet traffic - more than human. It's a complex problem. The difference between bot and human activity is hard to differentiate and we all operate in a system where bots solve many of our business problems....
Three Ukrainian men who were allegedly part of a hacking gang that stole more than 15 million payment card records from U.S. businesses, sold the data in underground markets and enabled at least $12.4 million in fraud have been arrested in Germany, Poland and Spain at the request of the U.S.
Organizations must mitigate the threat of malware upload and delivery to
their websites. Oracle Dyn Malware Protection provides the coverage that
every business needs.
Many digital businesses allow file uploads via their websites and web
applications. Site owners permit (and often require) their customers to...
API endpoints have become a weak link in today's enterprise networks. Organizations are deploying Application Program Interface (API)
endpoints at an ever-increasing rate to keep up with the demands of
mobile applications, server-to-server communication, and microservice
requirements. This creates a broader attack...