Malware
The Analyst Prompt #10: AI Facial Recognition Used in Ukraine/Russia War Prone to Vulnerabilities
Malware Trends: Responding to Fileless Malware Requires Forward Leaning Vulnerability Management It appears 2022 is the year fileless malware becomes a more frequent threat. A fileless malware attack is a technique ...
Palo Alto Networks Sees Rise in Ransomware Payments
Palo Alto Networks this week disclosed that, in cases worked by its Unit 42 incident response team, the average ransomware payment rose to $925,162 during the first five months of 2022. That ...
Emotet Proved Too Effective for Threat Actors to Abandon
Old malware—even strains that have been taken down by law enforcement—never die. Nor do they just fade away; instead, they disappear for a while, regroup and re-emerge. This is exactly what the ...
Remotely Controlling Touchscreens
Researchers have demonstrated controlling touchscreens at a distance, at least in a laboratory setting: The core idea is to take advantage of the electromagnetic signals to execute basic touch events such as ...
Tools to Identify Exfiltration of Large Cryptocurrency Holdings Will Reduce Risk of Large Cyberattacks and Fraud on DeFi Platforms
Synopsis The Exfiltration Phase of The Kill Chain of a Cryptocurrency-Based Attack Provides the Greatest Opportunity to Identify Cybercriminals Cryptocurrency gained through illicit means is less useable than other assets due to ...
Ransomware demands acts of kindness to get your files back
The great thing about working in the world of cybersecurity is that there’s always something new. You may think you’ve seen it all, and then something comes along that completely surprises you ...
Why Zero-Trust Must Extend to Deep Infrastructure
It is a dramatic understatement to say that staying one step ahead of continually evolving cyberthreats like ransomware, malware and other severe attacks must be a top priority. Today’s global community of threat ...
Rajiv Kulkarni Talks about the Malware Analysis Pipeline
TechSpective Podcast Episode 089 There is no such thing as perfect or invulnerable cybersecurity. The goal of cybersecurity is to raise the bar or cost of entry to make it as challenging ...
Rajiv Kulkarni Talks about the Malware Analysis Pipeline
TechSpective Podcast Episode 089 There is no such thing as perfect or invulnerable cybersecurity. The goal of cybersecurity is to raise the bar or cost of entry to make it as challenging ...
What is Ransomware Detection?
Ransomware detection notifies you when your files have been attacked and guides you through the process of restoring your files. Ransomware is a type of malicious software (malware) designed to block access ...