article thumbnail

Tenable Bolsters Its Cloud Security Arsenal with Malware Detection

Tenable

Tenable Cloud Security is enhancing its capabilities with malware detection. Even though cloud adoption has become mainstream, many threats and attack tactics still rely on malware payloads. Tenable Cloud Security can now find malware in many different cloud workloads. The addition of malware detection enhances this approach.

Malware 63
article thumbnail

CISA’s Malware Analysis Platform could Foster Better Threat Intel

Ooda Loop

The US Cybersecurity and Infrastructure Security Agency (CISA) has given organizations a new resource for analyzing suspicious and potentially malicious files, URLs, and IP addresses by making its Malware Next-Gen Analysis platform available to everyone earlier this week.

Malware 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian Cyberspies Deliver ‘GooseEgg’ Malware to Government Organizations

Ooda Loop

According to a Microsoft report, Russian-linked cybercrime group APT28 has been exploiting Windows Print Spooler vulnerabilities to deploy an exploitation tool against organizations across Western Europe, in Ukraine, and in the US.

Malware 59
article thumbnail

Escalating Malware Tactics Drive Global Cybercrime Epidemic

Ooda Loop

The average malware detections rose 80% in Q4 2023. Most of the increased malware instances affected the Americas and Asia-Pacific.

Malware 59
article thumbnail

Detecting eBPF Malware with Tracee

Aqua Security

It is widely used by many security tools for monitoring kernel activity to detect and protect organizations. Lately, we have seen a rise in the number of eBPF based tools used for malicious goals such as rootkits ( ebpfkit, TripleCross ) and malwares ( pamspy ).

Malware 96
article thumbnail

Solar Spider Spins Up New Malware to Entrap Saudi Arabian Financial Firms

Ooda Loop

The threat group behind a complex JavaScript remote access Trojan (RAT) known as JSOutProx has released a new version of the malware to target organizations in the Middle East. Resecurity, a cybersecurity services firm, is analyzing technical details of multiple instances of the malware targeting financial customers.

Malware 59
article thumbnail

Guarantee that Your Enterprise Will Recover from a Ransomware or Malware Cyberattack

CIO

In recent research, IDC found that 87% of organizations impacted by ransomware in the past year had to pay a ransom to recover their data. The “sting” of a ransomware or malware attack is removed quickly, efficiently, and comprehensively.

Malware 246