EVASIVE MALWARE DETECTION

SamSam creators to date have raked in $6 million and the ransomware continues to be a thorn in the sides of organizations in both the public and private sectors. Peter MacKenzie, global malware escalations manager working in Sophos Technical Support,

Ransomware has become a multimillion-dollar black market business for cybercriminals, and SamSam being a great example. New research revealed that the SamSam ransomware had extorted nearly $6 million from its victims since December 2015, when the cyber gang behind the

The Hidden Bee cryptominer is being delivered to users via an improved drive-by download toolkit which exploits the CVE-2018-4878 Flash Player vulnerability. The Flash bug is a critical vulnerability that can potentially allow an attacker to take control of the

Two days ago, Microsoft encountered a rapidly spreading cryptocurrency-mining malware that infected almost 500,000 computers within just 12 hours and successfully blocked it to a large extent. Dubbed Dofoil, aka Smoke Loader, the malware was found dropping a cryptocurrency miner

Researchers are warning users about the Coldroot remote access Trojan that is going undetected by AV engines and targets MacOS computers. The RAT is cross-platform and capable of planting a keylogger on MacOS systems prior to the OS High Sierra

Malware has threatened computers, networks, and infrastructures since the eighties. There are two major technologies to defend against this, but most organizations rely almost exclusively on just one approach, the decade’s old signature-based methodology. The more advanced method of detecting

Microsoft is putting Edge in a virtual machine to protect users from malware, viruses, phishing and zero-days. Microsoft has developed a new update for its Windows 10 operating system that will place the Edge web browser inside a virtual machine

The problem with today’s endpoints is that they are so varied:  a mix of desktop PCs, laptops and netbooks, frequently with different versions of OS and applications being used across organisations’ estates. This variety of endpoints also means that security