Deception at scale: How attackers abuse governmental infrastructure
Continuing our initiative of sharing VirusTotal’s visibility to help researchers, security practitioners and the general public better understand the nature of malicious attacks, we are proud to announce our “Deception at scale: How attackers abuse governmental infrastructure” report. Here are some of the main ideas presented there: Governmental domains are among the top categories used […] more…Political Figures Differ Online: Names of Trump, Obama, Merkel Attached to Ransomware Campaigns
Politics and ransomware. No, it’s not a lost single from the Oasis back catalogue, but in fact a relatively recent tactic by ransomware developers looking to exploit the profiles of major politicians to install ransomware on victims’ computers. Donald Trump, Angela Merkel, and now Barack Obama all serve as lures for the unsuspecting. Despite its […] more…JPEG Files Used For Targeted Attack Malware
We recently came across some malware of the SOGOMOT and MIRYAGO families that update themselves in an unusual way: they download JPEG files that contain encrypted configuration files/binaries. Not only that, we believe that this activity has been ongoing since at least the middle of 2010. A notable detail of the malware we came across […] more…More information
- LastPass Rushes to Patch Flaw That Exposed User Passwords
- Lacework Raises $24 Million to Expand Cloud Security Business
- US Bans WeChat, TikTok Citing Privacy, National Security
- Cisco-Sourcefire union raises many product overlap questions
- Defense in depth: Stop spending, start consolidating
- Wireless controller software upgrade – Commonwealth Campuses
- Judge sets 71-month sentence for former Secret Service agent who plundered Silk Road
- Economics of Ransomware – To Pay Or Not To Pay?
- Here’s how the new Windows Blue Start Button may work
- Russian Hacker Gets 27-Year Prison Sentence