Taking Down an Android Botnet
A collaborative effort among more than half a dozen security and technology companies has disrupted a botnet that was attacking content providers and content delivery networks with compromised Android devices.
The Cost of a Malware Infection? For Maersk, $300 Million
The NotPetya fallout continues, with global transport and logistics conglomerate Maersk reporting up to $300 million in losses following a June cyber attack.
Merck Earnings Per Share Projections Drop following Malware Infection
With the release of its Q2 financial results, pharmaceutical giant Merck is the latest company to report material impact following malware infections.
BrickerBot, Mirai and the IoT Malware Knife Fight
The IoT landscape is becoming a battleground for all manner of malware, with some variants fighting for control of infected devices and authors racing to get their creations onto as many devices as possible.
Attack of the Killer Cameras
By now, you will be aware that the Internet of Things is a thing and that it is an ever-growing network made up of disastrously insecure appliances, vehicles, cameras, and other devices connected to the Internet. What you may not be aware of is that this shadow network is now being used as a weapon to attack web sites with DDoS floods with some of the highest volumes ever seen.
What a script! Detecting and analyzing a Flash drive-by attack (Screenshot Demo)
Flash drive-by downloads and malvertising continue to be common attack vectors for malware infections. Here's a look at how these attacks can be detected and stopped based on behavioral characteristics.
Detecting and Mitigating USB Propagating Malware (Screenshot Demo)
Put those hot glue guns away – here’s how to detect and mitigate USB propagating malware.
A Good Phishing Attack is Worth a Million Zero-Days
Dridex keeps coming back with a vengeance - let's take a look at how the malware works and what can be done to stop it.
Detecting CryptoWall 3.0 Using Real Time Event Correlation
Today we’re sharing a use case from the DG Lab in which we detected a variant of the CryptoWall 3.0 ransomware by correlating indicators of compromise within system process calls in real time.
Recent Breaches, Alerts Call for Improved Defense Against POS Malware
Cyber attacks relying on POS malware have made a major resurgence – read on to learn about some new developments and incidents involving POS malware as well as tips for protecting POS systems against data breaches.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!