‘WannaCry Hero’ Marcus Hutchins Pleads Guilty to Making Banking Malware

The researcher who helped stop the WannaCry ransomware pleaded guilty to two counts of hacking for writing banking malware in 2014. Continue reading ‘WannaCry Hero’ Marcus Hutchins Pleads Guilty to Making Banking Malware

Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack

Threatpost talks to Phil Neray with CyberX about Tuesday’s ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more. Continue reading Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack

Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019?

The evolution of the new and difficult-to-detect category of fileless malware may soon take an insidious turn with the development of what some researchers are calling vaporworms.

The post Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019? appeared first on Security Intelligence.

Continue reading Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019?

NSA’s Joyce outlines how U.S. can disrupt and deter foreign hacking

The United States will do more to disrupt the malicious cyber-activity that foreign adversaries are aggressively using to advance their interests, a National Security Agency official said Thursday. “We have to impose costs in a visible way to start deterrence,” said Rob Joyce, senior cybersecurity adviser at NSA. “We have to go out and try to make those operations less successful and harder to do.” Speaking to an industry association in Hanover, Maryland, Joyce cited the 2017 WannaCry and NotPetya malware outbreaks — and Russia’s use of information operations in the 2016 U.S. election — as examples of nation-states moving from “exploitation to disruption” to impose their will in cyberspace. Washington has blamed North Korea and Russia, respectively, for the devastating WannaCry and NotPetya attacks, which cost billions of dollars in economic damage. Some foreign governments have less legal constraints on their activities in cyberspace than the U.S., Joyce told a local […]

The post NSA’s Joyce outlines how U.S. can disrupt and deter foreign hacking appeared first on CyberScoop.

Continue reading NSA’s Joyce outlines how U.S. can disrupt and deter foreign hacking

Triton, BlackEnergy, WannaCry – Has Your Behavior Changed?

Hopefully the title of this blog has gotten your attention. In one of my prior blogs, ICS Cybersecurity: Visibility, Protective Controls, Continuous Monitoring – Wash, Rinse, Repeat, we talked about how the malicious threat landscape for industri… Continue reading Triton, BlackEnergy, WannaCry – Has Your Behavior Changed?

Microsoft hopes crowdsourced A.I. algorithms will help avoid the next global cyberattack

If you’ve developed an artificial intelligence tool capable of predicting the next ransomware outbreak, Microsoft wants to hear about it. And they’re willing to pay. More than 300 data scientists, security practitioners and academics are involved in an initiative to help Microsoft determine which Windows machines are the most vulnerable to malicious software. The competition challenges participants to assess the probability a device will be hit with malware based on different factors about the machine, ranging from the firewall configuration to the antivirus software and CPU. Microsoft announced the competition on Dec. 13, giving participants three months to develop an algorithm that can predict whether a Windows 10 or Windows XP computer, for example, is likely to be infected with the next major virus, organizers said. The competition offers a glimpse at how cybersecurity will blend with artificial intelligence and machine learning, as major companies invest in experiments that could […]

The post Microsoft hopes crowdsourced A.I. algorithms will help avoid the next global cyberattack appeared first on CyberScoop.

Continue reading Microsoft hopes crowdsourced A.I. algorithms will help avoid the next global cyberattack

This Cybersecurity Firm Listens to the Background ‘Noise’ of the Internet

The internet is a bustling place, with hackers constantly firing exploits against whoever they can. Cybersecurity firm GreyNoise is trying to filter out some of that noise. Continue reading This Cybersecurity Firm Listens to the Background ‘Noise’ of the Internet