Evasive malware increasing, evading signature-based antivirus solutions

Evasive malware has grown to record high levels, with over two-thirds of malware detected by WatchGuard in Q4 2019 evading signature-based antivirus solutions. This is a dramatic increase from the year-long average of 35% for 2019 and points to the fac… Continue reading Evasive malware increasing, evading signature-based antivirus solutions

14 Ways to Evade Botnet Malware Attacks On Your Computers

Cybercriminals are busy innovators, adapting their weapons and attack strategies, and ruthlessly roaming the web in search of their next big score.

Every manner of sensitive information, such as confidential employee records, customers’ financial data… Continue reading 14 Ways to Evade Botnet Malware Attacks On Your Computers

As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections

Amid significant increases in both malware and network attacks, multiple Apache Struts vulnerabilities – including one used in the devastating Equifax data breach – appeared for the first time on WatchGuard’s list of most popular network attacks in Q3 … Continue reading As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections

Free download: Botnet and IoT Security Guide 2020

The Council to Secure the Digital Economy (CSDE), a partnership between global technology, communications, and internet companies supported by USTelecom—The Broadband Association and the Consumer Technology Association (CTA), released the International… Continue reading Free download: Botnet and IoT Security Guide 2020

VisibleV8: Stealthy open source tool for monitoring JavaScript in the wild

An open source tool that allows users to track and record the behavior of JavaScript programs without alerting the websites that run those programs has been developed at North Carolina State University. The tool, called VisibleV8, runs in the Chrome br… Continue reading VisibleV8: Stealthy open source tool for monitoring JavaScript in the wild

Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises

Cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as anti-analysis techniques as they become more sophisticated in their attempts, according to Fortinet. Upping the ant… Continue reading Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises

TLS Fingerprinting: Rethinking Encrypted Traffic Analysis Strategies

 There seems to be some confusion about the appropriate way to use TLS fingerprinting in an environment. Anytime an SSL library, a library that uses any of those libraries, an OS or the application itself is updated or changed, there’s a good possibil… Continue reading TLS Fingerprinting: Rethinking Encrypted Traffic Analysis Strategies

In the New Fight Against Malware, It’s Spy vs. Spy

Cybersecurity teams are in a tough spot. New, insidious types of malware are emerging all the time (more than 800 million total million malware seen in 2019). In many cases, corporate security programs simply don’t have the resources to keep up with t… Continue reading In the New Fight Against Malware, It’s Spy vs. Spy

5 Keys to Improve Your Cybersecurity

Cybersecurity isn’t easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity problems, everyone would buy that thing, and we could all rest easy.

However, that is not the way it works. Technology … Continue reading 5 Keys to Improve Your Cybersecurity

Researchers develop new technique to identify malware in embedded systems

A technique for detecting types of malware that use a system’s architecture to thwart traditional security measures has been developed by researchers from North Carolina State University and the University of Texas at Austin. The new detection ap… Continue reading Researchers develop new technique to identify malware in embedded systems