Are you ready for state-sponsored zombie malware attacks?

CTOvision

In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets […]. Artificial Intelligence CTO Cyber Security Cyber Threats Internet of Things News Robots Cybersecurity Malware

Dell Data Protection Protected Workspace & Malware Prevention

CTOvision

The video below explores DDP Protected Workspace and uniquely addresses healthcare regulations related to malware prevention. Individuals take malware and obtain the characteristics pertaining to the individual and find ways to get around the malware inspections in place.

Trending Sources

Citadel malware developer jailed

Computer Weekly

A Russian man believed to be one of the developers of the Citadel malware used to steal millions by infecting around 11 million computers around the world

How to Remove Malware Tips

Galido

Malware is an abbreviated term that stands for “malicious software.” What is Malware? There are various types of malware. Malware creation has become popular in recent times due to the the lure of money that can be made through organized Internet crime.

Fileless malware: An undetectable threat

Tech Republic Security

Fileless malware is a dangerous and devious threat--and it's gaining traction. Find out how it might affect your organization, network, and the devices connected to it

Malware distributors are switching to less suspicious file types

Network World

After aggressively using JavaScript email attachments to distribute malware for the past year, attackers are now switching to less suspicious file types to trick users. Last week, researchers from the Microsoft Malware Protection Center warned about a new wave of spam emails that carried malicious.LNK files inside ZIP archives. It has been abused to download malware in the past and there are even malware programs written entirely in PowerShell.

Malware Museum’s 10 greatest hits

Network World

Big hits Since the malware museum opened its virtual doors in February, its collection of de-fanged DOS-based malware from the 80s and 90s has attracted nearly 1 million views.

IT pros look to endpoint security to counter custom malware

Computer Weekly

IT professionals are focusing on endpoint security in the face of custom malware that is bypassing traditional perimeter defences, a survey shows

Non-malware attacks are on the rise

Network World

Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black. Attacks that exploited applications and processes legitimately running on systems – non-malware incidents – have risen from representing about 3% of all attacks in January to about 13% in November, the company’s “Non-malware attacks and ransomware take center stage in 2016” report says.

Study 23

Security Think Tank: Malware is sneaky

Computer Weekly

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches

Ransomware Evolves: Entire Hospital Including Emergency Rooms Disrupted

CTOvision

But still the malware gets in. The malware gets in. You can block and patch and try your hardest to prevent, but the bad guys will innovate and eventually malware gets in. Which leads to this advice: Work hard to prevent ransomware and other malware attacks by using best practices, and have your approach validated by an external assessment (see Cognitio ). But understand that this is an evolving threat, and eventually malware will get in. Bob Gourley.

WannaCry hero malware trial postponed

Computer Weekly

The US court appearance of British WannaCry hero on charges of writing and distributing malware has been postponed

Five more ways to minimize fileless malware infections

Tech Republic Security

Beyond disabling macros, restricting unnecessary scripting languages, and being diligent about patch management, there are many other ways to protect your systems against fileless malware

Crash Override: Malware that took down a power grid may have been a test run

Network World

Two security firms have released reports about the malware which was used in the December 2016 Ukraine power outage, warning that the partial power outage in Kiev may have been test run; the malware could be leveraged against other countries, including the US. The malware, dubbed Crash Override in the Dragos report ( pdf ) and Industroyer in the ESET report ( pdf ), has nothing to do with espionage and everything to do with cyber-sabotage.

Security Think Tank: Equip employees to guard against malicious malware

Computer Weekly

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches

IDG Contributor Network: Network analysis can find malware before it strikes

Network World

Network traffic analysis should be used more in the fight against malware. The researchers, who have been studying historic network traffic patterns, say the latest malware tracking should take advantage of inherent network-supplied barometers and stop simply focusing on trying to identify malware code already on networks and machines.

Study 30

Malware Museum causes controversy among security pros

Network World

The latter work (COFFSHOP.COM, artist unknown, if you’re keeping score) can be found at the Malware Museum, the brainchild of F-Secure Chief Research Officer Mikko Hypponen. Visitors can watch malware’s on-screen manifestations at the website and can even download emulations to their PCs.

Hunting Down and Killing Ransomware

IT Pros Rock!

Scareware, a type of malware that mimics antimalware software, has been around for a decade and shows no sign of going away. The goal of scareware is to fool a user into thinking that their computer is heavily infected with malware and the most convenient.( malware read more ).

Financial cyber attacks increase as malware writers join forces

Computer Weekly

Financial malware attacks increased 16% in the second quarter of the year, driven by collaboration between the developers of two banking Trojans in the top the financial malware threats, says Kaspersky Lab

New IoT malware targets 100,000 IP cameras via known flaw

Network World

Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that’s spreading through recently disclosed vulnerabilities in the products. The malware, called Persirai, has been found infecting Chinese-made wireless cameras since last month, security firm Trend Micro said on Tuesday. The malware does so by exploiting flaws in the cameras that a security researcher reported back in March.

Victim Blaming Won't Stop Global Ransomware Attacks

Forrester IT

I have yet to meet a single user that clicked a malicious link intentionally - beyond security researchers and malware analysts that is. The malware author created the tool to use multiple attack vectors. Yes, patching helps, but this malware also captures credentials. So, if an organization has a single system they can't patch for legitimate business reasons the malware can land, capture credentials, and then move laterally through the environment. malware.

The Case of the Sysinternals-Blocking Malware

IT Pros Rock!

Continuing the theme of focusing on malware-related cases (last week I posted The Case of the Malicious Autostart ) as a lead up to the publication on March 15 of my novel Zero Day , this post describes one submitted to me by a user that took a unique.(

Non-malware attacks pose bigger threat than malicious software

Computer Weekly

Malware-free cyber attacks are on the rise and artificial intelligence in cyber security is still far from replacing humans, according to most cyber security researchers

Mysterious malware targets industrial control systems

Computerworld Vertical IT

Researchers have found a malware program that was designed to manipulate supervisory control and data acquisition (SCADA) systems in order to hide the real readings from industrial processes. The same technique was used by the Stuxnet sabotage malware allegedly created by the U.S. The new malware was discovered in the second half of last year by researchers from security firm FireEye, not in an active attack, but in the VirusTotal database.

Stealthy cyberespionage malware targets energy companies

Network World

Security researchers have discovered a new malware threat that goes to great lengths to remain undetected while targeting energy companies. The malware program, which researchers from security firm SentinelOne have dubbed Furtim’s Parent, is a so-called dropper -- a program designed to download and install additional malware components and tools. The goal of droppers is to prepare the field for the installation of other malware components that can perform specialized tasks.

Microsoft Office users beware: New malware comes through PowerPoint email attachment

Tech Republic Security

Trend Micro research has identified a new malware threat that presents itself in the form of a malicious PPSX file attachment. Here's what professionals should look out for

Fileless Malware: You should already be prepared

IT Toolbox

The buzzword "fileless malware" is increasingly causing fear, uncertainty, and doubt. But we should already have controls in place

What Can You Do About Malware In The Cloud?

CTOvision

Malware exists even there - and it spreads fast. And like any system with a physical backend, the cloud can easily be subject to a wide range of vulnerabilities - including malware. But malware on the cloud is a very real, and very present threat. The problem is that the malware components aren’t identifiable through traditional scanning simply because they aren’t assembled as malware until the moment of attack.Some exploits appear to be benign.”.

Study 28

Using AI-enhanced malware, researchers disrupt algorithms used in antimalware

Tech Republic Security

Who will win: Antimalware developers or malware developers Artificial intelligence algorithms are involved in a cyber arms race.

Cisco, Fortinet issue patches against NSA malware

Network World

Customers of certain Cisco and Fortinet security gear need to patch exploits made public this week after a purported hack of NSA malware. Both companies have issued fixes to address exploits that were posted online and after they found the exploits represent real threats to some of their products, including versions of Cisco’s popular PIX and ASA firewalls and versions of Fortinet’s signature Fortigate firewalls.

Five ways to minimize fileless malware infections

Tech Republic Security

Learn how to protect against fileless malware infections, reduce exposure, and prevent the damage from spreading to other networked systems

DHS wants to predict how malware will morph

Network World

The Department of Homeland Security (DHS) wants to be able to predict what form malware will morph to so it can plan how to block it when it becomes reality. 500,000 to develop the technology, known as Predictive Malware Defense (PMD). Charles River will use machine learning and statistical models to predict attacks based on new malware as well as create defenses ahead of time. The models will look at features of families of malware and predict how they might evolve.

Double Agent attack can turn antivirus into malware

Network World

A zero-day attack called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives. Based on a 15-year-old feature in Windows from XP through Windows 10, the attack is effective against all 14 vendors’ antivirus products tested by security vendor Cybellum – and would also be effective against pretty much every other process running on the machines.