article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2015-5122.

Malware 74
article thumbnail

COVID-19: Coronavirus Fears Seized by Cybercriminals

Tenable

Malware and phishing campaigns use global interest in the novel coronavirus to capitalize on fear and uncertainty around the pandemic. Coronavirus-themed malware campaigns. IBM’s X-Force team compiled some indicators of compromise on January 29 and published a summary blog post on February 5. Image source: Proofpoint blog.

Malware 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Retrospection & Full PCAP Reveal Instances of XcodeGhost Dating Back to April 2015.

ProtectWise

Last month when news broke of XcodeGhost , the iOS malware that infected apps on the Apple App Store, we retrospected our haystack for evidence of this malware across our customers. For example, malware communications that are encrypted often hide critical information from incident responders. Decoded Result.

Malware 40
article thumbnail

Busted by Cortex XDR: a True Story of Human Intuition and AI

Palo Alto Networks

Although the malware was a never-before-seen mutation of the Qbot virus, our Behavioral Threat Protection (BTP) engine caught it. Fortunately, the Cortex XDR endpoint agent killed the malware as soon as the executable attempted to run. They know that Unit 42 is at the cutting edge of malware discovery. We’re Not Done Yet.

article thumbnail

Update on Invincea: Another year of breakthrough growth

CTOvision

FAIRFAX, VA – Janary 27, 2015: Invincea, Inc., 8,935,773 for “Malware Detector.”. Grew revenue in Invincea Labs research division by 150% over 2013, while successfully launching its Cynomix crowdsourced malware analysis platform in Invincea Research Edition and at Cynomix.org. Follow Invincea: Invincea Blogs: [link].

Malware 109
article thumbnail

ContiLeaks: Chats Reveal Over 30 Vulnerabilities Used by Conti Ransomware – How Tenable Can Help

Tenable

In this blog post, we’ll offer background into Conti – one of the more prolific ransomware groups in operation today – dig into the leaked information, and offer concrete advice on how to protect your organization against Conti’s attacks. These include phishing, malware and brute force attacks against Remote Desktop Protocol.

Windows 101
article thumbnail

Game Change: Three Reasons Why #SonyHack Will Change Security

CTOvision

Anup Ghosh, CEO of Invincea published well reasoned context on the Sony Hack at the Invincea blog, it is reposted below for your consideration. See the interview here: Tactics Not Malware Are the Story. The hackers captured and exfiltrated hundreds of terabytes of data then torched the network with wiper malware. – bg.

Security 112