Malware August 20, 2015 Diagnosing the Details of a Malware Infection 2 min read - As threat detection techniques evolve, so does the malware infection process, which typically includes advanced verions of downloaders, droppers and more.
Threat Intelligence August 18, 2015 Gozi Goes to Bulgaria — Is Cybercrime Heading to Less Charted Territory? 4 min read - The latest version of the Gozi banking Trojan looks to target banks in Bulgaria. This could be just the first instance of the malware in Eastern Europe.
August 11, 2015 DGA Changer Malware Variant Shows How Attackers Are Improving Domain Names 2 min read - Researchers have discovered that those attackers behind the DGA Changer malware have come up with an even better way to avoid sandbox detection.
Advanced Threats August 6, 2015 Are These Airline Hacks Related? 3 min read - Several confirmed or suspected hacks of major airlines wreaked havoc on global travelers, but were there more to these attacks than meets the eye?
Intelligence & Analytics August 5, 2015 Information Security Is Not Stagnant, but Dynamic 2 min read - Information security has changed drastically in a short amount of time, but defense strategies are not keeping pace with its dynamic nature.
Advanced Threats August 4, 2015 DDoS Extortion: Ransomware’s Older Cousin 2 min read - Though ransomware has been received a lot of press, extortion by threat of distributed denial-of-service (DDoS) attack is still very real — and dangerous.
Malware July 31, 2015 The Top Ways Cybercriminals Infiltrate Retailers’ Systems and Steal Customer Data 3 min read - Retailers are tasked with protecting the customer data that resides within their point-of-sale systems. But what is the best way to prevent breaches?
Threat Intelligence July 30, 2015 HORNET: Anonymity May Come at a Price — Likely in Hard Cash! 6 min read - As a quicker and more private alternative to Tor emerges, should we be concerned over the potential applications cybercriminals will find for HORNET?
X-Force July 23, 2015 An Analysis of the Qadars Banking Trojan 26 min read - This blog provides a deep, technical look into the Qadars banking Trojan.
Malware July 21, 2015 Ransomware: The Enterprise’s Boogeyman 3 min read - Ransomware is a growing problem in today's threat landscape, but organizations can prepare for and prevent this type of malware from becoming an issue.