article thumbnail

Mitigating Advanced Threats with Scalable and Automated Malware Analysis: An interview of Chad Loeven and Mike Hylton

CTOvision

Scalable automated malware analysis has become a critical component of enterprise defense. When properly implemented it can be key to mitigating malware threats that otherwise bypass perimeter defenses. It is based on an […].

Malware 322
article thumbnail

Raspberry Robin Malware Evolves with Sophisticated Evasion Tactics

SecureWorld News

The Raspberry Robin malware, a heavily obfuscated Windows worm first identified in late 2021, has become one of the most prevalent threats facing enterprises today. These script files employ a range of anti-analysis techniques to evade detection. The obfuscation techniques used by this malware payload system are impressive.

Malware 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Report: 93% of orgs are challenged by malware analysis

Venture Beast

Malware analysis has become a critical process for businesses to proactively consume threat intelligence and hunt for active threats. Read More.

Malware 84
article thumbnail

The Death And Life Of The Stand-Alone Solution

Forrester IT

While automated malware analysis and network intrusion detection systems remained in our Divest category, three more technologies joined them this year: data loss prevention, managed security service providers, and security user behavior analytics. Why is this? This isn’t to say these solutions are dead, mind you.

Malware 483
article thumbnail

Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

Tech Republic Security

Based on the security researchers' analysis of the 2023 cyberthreat landscape, we highlight new or heightened risks.

Malware 185
article thumbnail

New Russian Malware Raises Concerns for Energy Grid Security

SecureWorld News

Security researchers at Mandiant have recently made a significant discovery in the realm of industrial control system (ICS) malware. Named "CosmicEnergy," this specialized operational technology (OT) malware poses a potential threat to critical infrastructure systems and electric grids.

Malware 69
article thumbnail

ANY.RUN vs. Joe Sandbox: Malware analysis tools comparison

Tech Republic

Malware analysis sandboxes let users determine if a file or URL is malicious, suspicious or legitimate. The post ANY.RUN vs. Joe Sandbox: Malware analysis tools comparison appeared first on TechRepublic. For daily use, two good solutions are ANY.RUN and Joe Sandbox. Let’s compare their features.