Apple-notarized malware foils macOS defenses

Shlayer adware creators have found a way to get their malicious payload notarized by Apple, allowing it to bypass anti-malware checks performed by macOS before installing any software. What is Apple Notarization? Apple uses a number of technologies to … Continue reading Apple-notarized malware foils macOS defenses

Project STAMINA Uses Deep Learning for Innovative Malware Detection

You’re familiar with the phrase, “A picture is worth 1,000 words.” Well, Microsoft and Intel are applying this philosophy to malware detection—using deep learning and a neural network to turn malware into images for analysis at scale. Project STAMINA—a… Continue reading Project STAMINA Uses Deep Learning for Innovative Malware Detection

Can you trust attachments with unfamiliar extensions?

Microsoft’s security experts have warned on Monday about several email malware delivery campaigns exploiting the COVID-19 pandemic targeting companies in the US and South Korea. What they have in common is the ultimate delivery of the Remcos RAT … Continue reading Can you trust attachments with unfamiliar extensions?

Kwampirs threat actor continues to breach transnational healthcare orgs

The Kwampirs (aka Orangeworm) attack group continues to target global healthcare entities in this time of crisis, the FBI has warned. “Targeted entities range from major transnational healthcare companies to local hospital organizations,” t… Continue reading Kwampirs threat actor continues to breach transnational healthcare orgs

Evasive malware increasing, evading signature-based antivirus solutions

Evasive malware has grown to record high levels, with over two-thirds of malware detected by WatchGuard in Q4 2019 evading signature-based antivirus solutions. This is a dramatic increase from the year-long average of 35% for 2019 and points to the fac… Continue reading Evasive malware increasing, evading signature-based antivirus solutions

14 Ways to Evade Botnet Malware Attacks On Your Computers

Cybercriminals are busy innovators, adapting their weapons and attack strategies, and ruthlessly roaming the web in search of their next big score.

Every manner of sensitive information, such as confidential employee records, customers’ financial data… Continue reading 14 Ways to Evade Botnet Malware Attacks On Your Computers

As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections

Amid significant increases in both malware and network attacks, multiple Apache Struts vulnerabilities – including one used in the devastating Equifax data breach – appeared for the first time on WatchGuard’s list of most popular network attacks in Q3 … Continue reading As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections

Free download: Botnet and IoT Security Guide 2020

The Council to Secure the Digital Economy (CSDE), a partnership between global technology, communications, and internet companies supported by USTelecom—The Broadband Association and the Consumer Technology Association (CTA), released the International… Continue reading Free download: Botnet and IoT Security Guide 2020

VisibleV8: Stealthy open source tool for monitoring JavaScript in the wild

An open source tool that allows users to track and record the behavior of JavaScript programs without alerting the websites that run those programs has been developed at North Carolina State University. The tool, called VisibleV8, runs in the Chrome br… Continue reading VisibleV8: Stealthy open source tool for monitoring JavaScript in the wild