In the New Fight Against Malware, It’s Spy vs. Spy

Cybersecurity teams are in a tough spot. New, insidious types of malware are emerging all the time (more than 800 million total million malware seen in 2019). In many cases, corporate security programs simply don’t have the resources to keep up with t… Continue reading In the New Fight Against Malware, It’s Spy vs. Spy

5 Keys to Improve Your Cybersecurity

Cybersecurity isn’t easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity problems, everyone would buy that thing, and we could all rest easy.

However, that is not the way it works. Technology … Continue reading 5 Keys to Improve Your Cybersecurity

Researchers develop new technique to identify malware in embedded systems

A technique for detecting types of malware that use a system’s architecture to thwart traditional security measures has been developed by researchers from North Carolina State University and the University of Texas at Austin. The new detection ap… Continue reading Researchers develop new technique to identify malware in embedded systems

Cybercriminals are becoming more methodical and adaptive

Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations improve in areas such as time to detection and response to threats, according to… Continue reading Cybercriminals are becoming more methodical and adaptive

Researchers unveil February 2019’s most wanted malware

Coinhive has once again led Check Point’s Global Threat Index for the 15th consecutive month, despite the announcement that its services have been shut down from March 8th 2019. GandCrab ransomware Researchers have also discovered several widespr… Continue reading Researchers unveil February 2019’s most wanted malware

Mining malware evades agent-based cloud security solutions

Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining malware’s effect. Keeping its presence from being noticed as long as possible is, na… Continue reading Mining malware evades agent-based cloud security solutions

Endpoint security solutions challenged by zero-day and fileless attacks

There is an endpoint protection gap against modern threats, the result of a recent survey by the Ponemon Institute and Barkly have shown. The organizations polled 660 IT and security professionals to get insight on the state of endpoint security risk, … Continue reading Endpoint security solutions challenged by zero-day and fileless attacks

GrrCon Augusta 2018, Adam Hogan’s ‘Malware Mitigation Sample Detonation Intelligence Automation: Make Your Binaries Work for You’

Videography Credit: Irongeek (Adrian Crenshaw).
Permalink
The post GrrCon Augusta 2018, Adam Hogan’s ‘Malware Mitigation Sample Detonation Intelligence Automation: Make Your Binaries Work for You’ appeared first on Security Boulevard.
Continue reading GrrCon Augusta 2018, Adam Hogan’s ‘Malware Mitigation Sample Detonation Intelligence Automation: Make Your Binaries Work for You’