
Hidden in plain sight: Four signs your network might be under attack
It’s a well-documented fact that an organization may be under attack and not even know it, with malware spreading undetected across the network for days, weeks or even …

Ransomware enters companies through RDP servers
Attackers wielding ransomware are targeting enterprises through an often-found hole in the corporate network: Internet facing, poorly secured remote desktop servers. According …
Gozi malware creator sentenced to time served
Nikita Kuzmin, the creator of the Gozi malware, was sentenced on Monday in Manhattan federal court to time served (37 months). He was also ordered to pay nearly $7 million in …

Malicious Chrome update actively targeting Android users
A fake malicious Chrome update is being actively pushed onto Android users, saddling them with information-stealing malware that can be uninstalled only by restoring the …

Cybercriminals filtering out victims by location
There’s a growing trend among cybercriminals to target and even filter out specific countries when designing ransomware, according to SophosLabs. To lure more victims …

Screen overlay Android malware is on the rise
As predicted, the ability to lay screens over legitimate (e.g. banking) apps is becoming a crucial feature for the success of Android malware. The capability was first seen in …

Former Tor developer helped the FBI unmask Tor users
A developer who used to work at Tor Project is the mastermind behind “Torsploit” (aka “Cornhusker”), the malware that was used by the FBI in 2012 to …

Fake Chrome LastPass extension leads to unwanted installs
A fake LastPass extension has been found lurking on the Chrome Web Store, offering promises of free and easy password management, but instead taking users for a ride involving …

Cybercriminals increasingly exploiting human nature
Cybercriminals are exploiting human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware, finds the Verizon 2016 Data …

Exploit kit targets Android devices, delivers ransomware
Ransomware hitting mobile devices is not nearly as widespread as that which targets computers, but Blue Coat researchers have discovered something even less common: mobile …

Bangladesh Bank hackers compromised SWIFT software with bespoke malware
Bit by bit, indications about how the attackers who targeted Bangladesh’s central bank managed to take off with some $80 milllion (of the nearly $1 billion they aimed …

TeslaCrypt: New versions and delivery methods, no decryption tool
TeslaCrypt ransomware was first spotted and analyzed in early 2015, and soon enough researchers created a decryption tool for it. The malware has since reached versions 4.0 …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade