Please turn on your JavaScript for this page to function normally.
Webroot
Smarter threats and the rising complexity of cybercrime

85,000 new malicious IPs are launched every day, and the top phishing targets are technology companies and financial institutions, the new Webroot 2015 Threat Brief reveals. …

flames
Knowledge base of malware intelligence enables rapid containment

The Lastline Knowledge Base (LLKB) launched at the RSA Conference 2015. The new software module can be combined with the Lastline Breach Detection Platform to give security …

abstract
Evasive malware goes mainstream

“Lastline Labs conducted analysis of hundreds of thousands of malware samples collected in 2014 and they unveiled their findings at RSA Conference 2015 in San Francisco. …

White House cyber attackers linked to OnionDuke APT actor

“It’s widely believed that the October 2014 breaches of US State Department and White House computer systems have been executed by Russian hackers. Kaspersky Lab …

Mobile malware is like Ebola – an overhyped threat

“Today, at RSA Conference 2015 in San Francisco, Damballa unveiled research which details the overblown nature of the mobile malware problem. Damballa monitos nearly 50% …

New fileless malware found in the wild

“Since the discovery of the Poweliks fileless Trojan in August 2014, researchers have been expecting other similar malware to pop up. The wait over: Phasebot malware, …

Upatre malware gets full SSL comms encryption

“The extremely popular Upatre Trojan downloader has undergone considerable changes that will make it and its communication more difficult to spot and block. The changes …

TeslaCrypt ransomware pushed by several exploit kits

TeslaCrypt is one of the newest additions to the ransomware category of malware, and is being pushed out to users left and right. Aside from the usual assortment of file types …

Attorney claims cops planted spying malware on drive containing evidence

Police force using malware in investigation is not an unheard-of situation but, according to an affidavit filed in a whistle-blower case against the Fort Smith Police …

CoinVault ransomware: Retrieve data without paying the criminals

Victims of the CoinVault ransomware have a chance to retrieve their data without having to pay the criminals, thanks to a repository of decryption keys and a decryption …

Simda botnet taken down in global operation

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation. In a series of simultaneous actions around the …

TorLocker victims can decrypt most files without paying ransom

Crypto-ransomware rarely means good news for targets, but when it comes to TorLocker malware (detected as Trojan-Ransom.Win32.Scraper by Kaspersky Lab), the victims can …

Don't miss

Cybersecurity news