article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. Background. Description.

Malware 75
article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more! . To get all the details, read the blog “ Are You Ready for the Next Log4Shell? 3 - Attackers boost use of infostealer malware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

WannaCry Ransomware Review and Global Impact.

ProtectWise

The purpose of this blog post is to regroup on many conflicting statements on the ransomware and to summarize coverage from our perspective at ProtectWise. WannaCry's primary infection vector is through publicly accessible hosts running an unpatched version of Windows via the SMB protocol. How Does WannaCry Infect a Host?

article thumbnail

The odd case of a Gh0stRAT variant

AlienVault

As 2018 drew to a close and 2019 took over, I began to see a different behavior from SMB malware authors. Some key functionality is below: Can download more malware. Malware Analysis. Stage1 - Typically the first contact or entry point for malware. This is the first part of the malware to arrive on a system.

SMB 40
article thumbnail

We're Honored to Be Recognized Again! A Leader 11 Straight Times

Palo Alto Networks

Nova , new versions of our industry-leading software that enable organizations to stay ahead of emerging threats using inline deep learning and stop zero-day malware with zero stress. New Firewalls for Mid-size and SMB Businesses: Our newest fourth-generation ML-Powered NGFWs bring PAN-OS 11.0 Nebula and PAN-OS 11.0

article thumbnail

Busted by Cortex XDR: a True Story of Human Intuition and AI

Palo Alto Networks

Although the malware was a never-before-seen mutation of the Qbot virus, our Behavioral Threat Protection (BTP) engine caught it. Fortunately, the Cortex XDR endpoint agent killed the malware as soon as the executable attempted to run. No company has 100% endpoint agent coverage: We needed to look at the network for clues.

article thumbnail

Examining the Treat Landscape

Tenable

This blog post will explore tactics and vulnerabilities leveraged by attackers and how they compare to the treats of the season. Similarly ubiquitous and reliable for attackers, the Server Message Block (SMB) protocol is leveraged by diverse threat groups to achieve lateral movement in their attacks.

SMB 98