Archive

Archive

How Fileless Malware Changes The Way We Treat Cyber Threats

Traditionally, AV and other endpoint security products have focused on files (executables) to detect and prevent malware. There are several advantages to this. Files can be hashed, queried in reputation services, examined by both static analysis and machine learning, and ... »

Has the ‘Unhackable’ Wallet Been Hacked?

A week after launch Pen Testers say they have successfully hacked into the Bitfi wallet. July 2018 saw cryptocurrency hardware wallet manufacturer Bitfi offer a $100,000 (later raised to $250,000) bounty for anyone that was able to hack into their ... »

New Malware Maximizes Attackers Profits

New Russian born malware chooses if users should be attacked with Ransomware or Crypto Script. Historically, ransomware attacks have been strictly infecting computers with ransomware. While crypto attacks have been infecting CPU’s with crypto mining scripts. However, hackers have found ... »

The Dangerous Journey of a Fake WhatsApp App on OneDrive

Partner Symantec, recently discovered a new kind of malicious Android file hosted on a OneDrive account. Here’s what they have learned and how you can take countermeasures. Over the last few years, there has been a tremendous uptick in the ... »

Olympic Destroyer, the malicious file-wiping malware hits Pyeongchang

Security experts say they have identified a destructive malware dubbed “Olympic Destroyer” that was likely used in a cyber attack on the Pyeongchang Winter Olympics during the opening ceremony last week. Winter Olympics officials confirmed on Sunday that a cyber ... »