Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities

The IBM X-Force Exchange features new capabilities and notifications to help security analysts collaborate and share threat intelligence more efficiently.

The post Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities appeared first on Security Intelligence.

Continue reading Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities

Motivation roulette: Is pseudo-ransomware a term?

It used to be so simple. Attack campaigns were relatively simple to determine, for example when we detailed the recent Shamoon campaign it was clear that this was intended to disrupt the victim. In this case the target was clearly Saudi Arabia, and the use of a wiper component indicated the objective of the perpetrators of the attack. Equally the use of ransomware was just as clear, its use was intended to get paid. What … More Continue reading Motivation roulette: Is pseudo-ransomware a term?

Nasty Mamba ransomware that encrypts entire hard drive resurfaces

By Waqas
Mamba Ransomware Resurfaces in Brazil and Saudi Arabia With Nefarious
This is a post from HackRead.com Read the original post: Nasty Mamba ransomware that encrypts entire hard drive resurfaces
Continue reading Nasty Mamba ransomware that encrypts entire hard drive resurfaces

Microsoft Patches Critical Windows Search Vulnerability

Microsoft patched 25 critical vulnerabilities, including a remote code execution bug in Windows Search. Continue reading Microsoft Patches Critical Windows Search Vulnerability

Threat Hunting Services Are Now a Basic Necessity

EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.

The post Threat Hunting Services Are Now a Basic Necessity appeared first on Security Intelligence.

Continue reading Threat Hunting Services Are Now a Basic Necessity

A week in security (July 24 – July 30)

A compilation of security news and blog posts from the 24th of July to the 30th. We talked about ransomware, the Dark Web, smart toys, encryption, and other.

Categories:

Tags:

(Read more…)

The post A week in security (July 24 – July 30) appeared first on Malwarebytes Labs.

Continue reading A week in security (July 24 – July 30)

New tool can help prevent government-mandated backdoors in software, Swiss researchers say

A new framework from a lab in Switzerland could help prevent malware like Petya from spreading, but would also make it difficult — if not impossible — for governments to force software companies to deliver backdoored software updates in secret. The Petya ransomware, and its wiperware variant NotPetya, spread on the wings of a software update unwittingly issued by Ukrainian accounting software company M.E. Doc. An attacker, who many believe to be agents of the Russian government, owned M.E. Doc’s network and injected malicious code into a legitimate software update. This new proof-of-concept technology, dubbed “Chainiac” by the Decentralized/Distributed Systems (DEDIS) lab at the Swiss Federal Institute of Technology in Lausanne (EPFL), offers a decentralized framework that eliminates such single points of failure and enforces transparency, making it possible for security analysts to continuously review updates for potential vulnerabilities. “What Chainiac is trying to do,” Bryan Ford, leader of the group that […]

The post New tool can help prevent government-mandated backdoors in software, Swiss researchers say appeared first on Cyberscoop.

Continue reading New tool can help prevent government-mandated backdoors in software, Swiss researchers say

Bye, bye Petya! Decryptor for old versions released.

This post shows you how to use the special decryptor for the petya family: Petya, Msicha, and Goldeneye. Not suitable for copycats of these.
Categories:
Malwarebytes news
Tags: decryptorgoldeneyemftMischapetyatoos

(Read more…)

The post Bye, bye … Continue reading Bye, bye Petya! Decryptor for old versions released.