Commercial Malware Makes a Comeback in 2016

According to the IBM X-Force Threat Intelligence Index for 2017, commercial malware made a notable comeback in 2016 and remains a top threat in 2017.

The post Commercial Malware Makes a Comeback in 2016 appeared first on Security Intelligence.

Continue reading Commercial Malware Makes a Comeback in 2016

Churn Under the Surface of Global Cybercrime

Global cybercrime actors test their malware in small settings before launching internationally, leaving trails of clues to tip off astute security teams.

The post Churn Under the Surface of Global Cybercrime appeared first on Security Intelligence.

Continue reading Churn Under the Surface of Global Cybercrime

Churn Under the Surface of Global Cybercrime

Global cybercrime actors test their malware in small settings before launching internationally, leaving trails of clues to tip off astute security teams.

The post Churn Under the Surface of Global Cybercrime appeared first on Security Intelligence.

Continue reading Churn Under the Surface of Global Cybercrime

GootKit Developers Dress It Up With Web Traffic Proxy

X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.

The post GootKit Developers Dress It Up With Web Traffic Proxy appeared first on Security Intelligence.

Continue reading GootKit Developers Dress It Up With Web Traffic Proxy

GootKit Developers Dress It Up With Web Traffic Proxy

X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.

The post GootKit Developers Dress It Up With Web Traffic Proxy appeared first on Security Intelligence.

Continue reading GootKit Developers Dress It Up With Web Traffic Proxy

The Full Shamoon: How the Devastating Malware Was Inserted Into Networks

X-Force IRIS researchers found that the Shamoon malware operators relied on weaponized documents that leveraged PowerShell to infiltrate targeted networks.

The post The Full Shamoon: How the Devastating Malware Was Inserted Into Networks appeared first on Security Intelligence.

Continue reading The Full Shamoon: How the Devastating Malware Was Inserted Into Networks

Malware Writers Using Exclusion Lists To Linger

It seems malware writers using exclusion lists is not something new, but it’s still concerning people. To me it’d be a pretty obvious avenue, especially if you were crafting something a little more nefarious than average – like APT malware (Advanced Persistent Threat) tools. Definitely a chicken and egg problem, especially with Windows if you…

Read the full post at darknet.org.uk

Continue reading Malware Writers Using Exclusion Lists To Linger

Advanced Malware targeting Internet of the Things and Routers

Anything connected to the Internet could be hacked and so is the Internet of Things (IoTs).

The market fragmentation of IoTs or Internet-connected devices is a security nightmare, due to poor security measures implemented by their vendors.

Now, … Continue reading Advanced Malware targeting Internet of the Things and Routers