A week in security (March 26 – April 01)

A roundup of notable security news from March 26 to April 1, including data breaches, encryption, exploit kits, and more.
Categories:

Security world
Week in security

Tags: Androiddata breachencryptionexploit kitsp2p paymentQuantLoaderTLS

(Re… Continue reading A week in security (March 26 – April 01)

Exploit kits: Winter 2018 review

In this Winter 2018 review, we check the pulse of exploit kits and their latest developments.
Categories:

Exploits
Threat analysis

Tags: CVE-2014-6332CVE-2015-2419CVE-2015-7645CVE-2015-8651CVE-2016-0189CVE-2018-4878EKsexploit kitsgrandsoftGreen… Continue reading Exploit kits: Winter 2018 review

GandCrab ransomware distributed by RIG and GrandSoft exploit kits

Ransomware may have slowed its growth but is still a go-to payload for threat actors looking to monetize drive-by download attacks. The latest attempt: GandCrab ransomware.
Categories:

Exploits
Threat analysis

Tags: exploit kitsgandcrabgandcrab… Continue reading GandCrab ransomware distributed by RIG and GrandSoft exploit kits

RIG exploit kit campaign gets deep into crypto craze

We take a look at a prolific campaign that is focused on the distribution of coin miners via drive-by download attacks. We started to notice larger-than-usual payloads from the RIG exploit kit around November 2017, a trend that has continued more … Continue reading RIG exploit kit campaign gets deep into crypto craze

3 Malware Trends to Watch Out for in 2018

We already know the security industry witnessed several significant ransomware attacks in 2017. Some of these campaigns derived at least part of their success from recent developments among malware families more generally. These trends will no doubt co… Continue reading 3 Malware Trends to Watch Out for in 2018

A week in security (December 04 – December 10)

A compilation of notable security news and blog posts from December 04 to December 10, including Botnets, hacked toys, ransom demands and jailbreaks gone horribly wrong.
Categories:

Security world
Week in security

Tags: exploit kitshiddenlotusN… Continue reading A week in security (December 04 – December 10)

Terror exploit kit goes HTTPS all the way

A look at some techniques used by the Terror exploit kit to evade traffic-based detection.
Categories:

Exploits
Threat analysis

Tags: exploit kitsmalvertisingPropeller Ads Mediasmoke loaderTerror EKTerror exploit kit

(Read more…)

The… Continue reading Terror exploit kit goes HTTPS all the way

Europol: Ransomware is far and away criminals’ favorite attack method

For police tracking the cybercrime horse race, it’s clear that ransomware is pulling away. While security incidents of all types continue at breakneck pace, a new report from the European Union’s law enforcement organization Europol pointed to ransomware as one of the easiest, most effective and common threats seen across the world. “Ransomware has eclipsed most other cyberthreats with global campaigns indiscriminately affecting victims across multiple industries in both the public and private sectors,” Europol’s researchers wrote in the newly published 2017 Internet Organised Crime Threat Assessment (IOCTA). “Some attacks have targeted and affected critical national infrastructures at levels that could endanger lives. These attacks have highlighted how connectivity, poor digital hygiene standards and security practices can allow such a threat to quickly spread and expand the attack vector.” The IOCTA, designed to provide guidance and recommendations to law enforcement and governments across the continent, tracked ransomware attacks in the last year and […]

The post Europol: Ransomware is far and away criminals’ favorite attack method appeared first on Cyberscoop.

Continue reading Europol: Ransomware is far and away criminals’ favorite attack method