The Limits of Linguistic Analysis for Security Attribution

Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.

The post The Limits of Linguistic Analysis for Security Attribution appeared first on Security Intelligence.

Continue reading The Limits of Linguistic Analysis for Security Attribution

Scanner Shows EternalBlue Vulnerability Unpatched on Thousands of Machines

Data collected from the freely available scanner called EternalBlues shows that tens of thousands of computers remain vulnerable to the SMBv1 vulnerability that spawned WannaCry and ExPetr. Continue reading Scanner Shows EternalBlue Vulnerability Unpatched on Thousands of Machines

Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far

Organizations around the world and across industries have had to deal with more than their fair share of devastating data breaches so far in 2017.

The post Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far appeared first on Security Intelligence.

Continue reading Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far

Is Blockchain the Key to Stopping Ransomware Attacks?

Since bitcoin conversions are processed on a blockchain, security analysts can trace transactions to determine the root cause of a ransomware attack.

The post Is Blockchain the Key to Stopping Ransomware Attacks? appeared first on Security Intelligence.

Continue reading Is Blockchain the Key to Stopping Ransomware Attacks?

A week in security (July 03 – July 09)

A compilation of security news and blog posts from the 3rd of July to the 9th. We go over our latest Cybercrime Tactics & Techniques Report, summarize the Petya ransomware outbreak, and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 03 – July 09) appeared first on Malwarebytes Labs.

Continue reading A week in security (July 03 – July 09)

Report: Second quarter dominated by ransomware outbreaks

The second quarter of 2017 left the security world wondering, “What the hell happened?” With leaks of government-created exploits being deployed against users in the wild, a continued sea of ransomware constantly threatening our ability to work online, and the lines between malware and potentially unwanted programs continuing to blur, every new incident was a wakeup call.In this report, we are going to discuss some of the most important trends, tactics, and attacks of Q2 2017, including an update on ransomware, what is going on with all these exploits, and a special look at all the breaches that happened this quarter.

Categories:

Tags:

(Read more…)

The post Report: Second quarter dominated by ransomware outbreaks appeared first on Malwarebytes Labs.

Continue reading Report: Second quarter dominated by ransomware outbreaks

All this EternalPetya stuff makes me WannaCry

Get more background on the EternalPetya ransomware. Learn about its origin, attribution, decryption, and the methods of infection and propagation.
Categories:
Cybercrime
Malware
Tags: attributiondecryptionDoublePulsarEternalBlueEternalPetyaEternalRom… Continue reading All this EternalPetya stuff makes me WannaCry

Free as in Beer, or the Story of Windows Viruses

Whenever there’s a new Windows virus out there wreaking global havoc, the Linux types get smug. “That’ll never happen in our open operating system,” they say. “There are many eyes looking over the source code.” But then there’s a Heartbleed vulnerability that keeps them humble for a little while. Anyway, at least patches are propagated faster in the Linux world, right?

While the Linuxers are holier-than-thou, the Windows folks get defensive. They say that the problem isn’t with Windows, it’s just that it’s the number one target because it’s the most popular OS. Wrong, that’d be Android for the last …read more

Continue reading Free as in Beer, or the Story of Windows Viruses