Intelligence & Analytics September 24, 2018 Following the Clues With DcyFS: A File System for Forensics 5 min read - Decoy File System's overlay layer is a forensic tool that helps security teams piece together what happens during a cyberattack and collect key evidence in the aftermath of a breach.
September 21, 2018 First Publicly Known Malicious Crypto-Mining Campaign Launched Via Kodi 2 min read - Researchers at ESET discovered a malicious crypto-mining campaign launched via the Kodi platform that used add-on repositories to spread malware through Kodi's ecosystem and mine for Monero.
September 20, 2018 Cobalt Gang Using CobInt Downloader to Install Malware on Systems of Interest 2 min read - Security researchers observed the threat group Cobalt Gang using a downloader known as CobInt to infect and subsequently install additional malware on systems of interest.
Endpoint September 20, 2018 Ransomware 101: What Is Ransomware and How Can You Protect Your Business? 6 min read - What is ransomware? In short, it's malware that encrypts your data and demands a ransom fee for its supposed safe return. The best defense against this threat is to keep it off the network altogether.
Endpoint September 19, 2018 How to Drive ROI and Improve Endpoint Security as a Managed Security Services Provider 2 min read - As an IT managed service provider (MSP), you can help clients save money by providing a high-value endpoint security service that closes the visibility gap.
September 18, 2018 Spam Campaigns Using IQY Files Infect Japanese Users With BEBLOH and URSNIF Malware 2 min read - Researchers discovered spam campaigns last month that exploited IQY files to flood Japanese users with BEBLOH and URSNIF malware.
Data Protection September 17, 2018 Reconciling Trust With Security: A Closer Look at Cyber Deception With DcyFS 7 min read - Central to DcyFS's cyber deception capabilities is its ability to modulate subject trust through a hierarchical file system organization.
September 14, 2018 Mirai and Gafgyt IoT Malware Now Targeting SonicWall’s GMS and Apache Struts Exploits < 1 min read - Malware authors have released modified versions of the Mirai and Gafgyt IoT malware that are capable of targeting vulnerabilities affecting SonicWall's GMS and Apache Struts.
September 12, 2018 DanaBot’s Anti-VM Update Shows How Quickly Financial Cyberthreats Evolve 2 min read - DanaBot, one of the most recent financial cyberthreats, has developed a way to avoid detection on virtual machines as it shifts focus from Australia to Poland.
September 12, 2018 Researchers Observe Threat Actor Using Varied Tools and Payloads to Distribute Monero Miners 2 min read - Researchers observed a new threat actor known as Rocke leveraging a varied tool kit and multiple payloads to distribute cryptomining malware, including Monero miners.