Return of Necurs botnet brings new ransomware threat

The Necurs botnet has returned to the top ten most prevalent malware during November 2017, as cybercriminals used it to distribute a new form of ransomware, according to Check Point. “The re-emergence of the Necurs botnet highlights how malware that may seem to be fading away doesn’t always disappear or become any less of a threat. Despite […]

Microsoft Issues Emergency Patch for ‘Critical’ Flaw in Windows Security

Microsoft recently issued an emergency patch for its major Windows malware protection tool that fixes a critical vulnerability discovered by the UK’s National Cyber Security Centre (NCSC), an arm of the Government Communications Headquarters (GCHQ) intelligence agency. The remote code execution vulnerability (CVE-2017-11937) in the Microsoft Malware Protection Engine would allow an attacker to gain […]

Over 1 million monthly spam emails spreading new Adwind RAT variants

The holidays are busy times for most people – and that includes cyber criminals who are busy sending millions of spam emails carrying newly repackaged Adwind remote access Trojan (RAT) variants meant to avoid detection. Adwind is a cross-platform RAT that has also been called AlienSpy, Frutas, Unrecom, Sockrat, JSocket, and jRAT. This multifunctional RAT […]

Conficker: The Worm That Won’t Die

The Conficker worm has become the malware that just won’t die. More than nine years after it was first spotted in 2008, the worm continues to be detected by anti-malware systems with enough regularity to suggest that it remains a potent threat for organizations, especially those in the manufacturing, healthcare, and government sectors. In a report released […]

Security Leaders Must Adjust Cybersecurity Budgets to Effectively Address 2018 Cyber Threats

The natural trend in the cybersecurity industry is that spending money means you’re more secure; however, this isn’t always the case. While cybersecurity budgets will continue to increase in 2018, they will be increasingly focused on areas that will be most effective. We have observed over recent years most exploits lead back to unpatched or […]

FBI, Europol, Microsoft, ESET Team Up, Dismantle One of World’s Largest Malware Operations

A pervasive and long-running malware operation that used more than 460 different botnets and infected more than 1.1 million computers a month has been derailed in a yearlong operation by global law enforcement and cybersecurity vendors. The FBI, Europol’s European Cybercrime Center, Joint Cybercrime Action Task Force (J-CAT), Eurojust, and Germany’s Luneburg Central Criminal Investigation […]

Dark cloud: the threat of ransomware

Read Lisa R. Lifshitz’s article about why ransomware is a dangerous threat for businesses on Canadian Lawyer : Longtime readers of this column know that I am a huge fan of all things cloud — until now. Ramsomware is a type of malware that encrypts a target’s software files, forcing them to pay a “ransom” for […]

Verizon Shares 2 Cyber Threats Hurting Small Businesses

The Verizon Data Breach Investigations Report (DBIR) shined a spotlight on SMB vulnerabilities earlier this year, noting that 61 percent of cyber-attack victims last year were businesses of fewer than 1,000 employees. Another study shows that one in three SMBS suffered a ransomware attack last year. Read about the two top threats to small and […]

More port cyber security is needed

Rear Admiral Paul Thomas, assistant commandant for prevention policy at the US Coast Guard, stressed: “This is no longer an emerging threat; it is a very real threat and although we have made significant progress, it is very apparent that we have much work to do.” Read why Rear Admiral Paul Thomas of United States Coast […]

Combining Technology to Combat Cyber Threats

Read  Stephanie Neil’s article about how companies are combining technology to combat cyber threats on Automation World : As cyber threats become more complex, industrial control systems (ICS) are even more vulnerable to attack. To that end, plant floor security can’t be handled the same way as it is in the enterprise where all the […]