Author: Bert Rankin

Polymorphic malware has been around since the early 1990s, but it’s still wreaking havoc in our computers and networks. SC Magazine recently reported on a particularly nasty strain of polymorphic malware that, according to the article, “is able to evade over 75 percent of antivirus...

From Bad Rabbit to NotPetya, bad actors are constantly evolving their malware attack vectors–the methods they use to distribute sophisticated malware attacks. This ever-growing network threat landscape requires organizations to keep abreast of changes in the way in which malware is delivered. Keeping Pace with New...

Over the last few years, we’ve seen a number of families of malware written specifically for the Mac OS X operating system. There was Flashback, and more recently the KeRanger ransomware. We’ve also seen more targeted attacks where Mac OS X malware was written to...

A “watering hole attack” is one of many techniques used by cybercriminals to breach an organization’s online information system. Network security administrators should understand how watering hole attacks work, and how to guard against them. Watering hole attacks are neither new or common, but they continually...

One of the applications of advanced threat analytics is protecting people and devices from malicious advertisements. It has become increasingly common for websites, even well-known and trusted ones, to become victims of malicious advertisements or malvertising. When a user visits an infected site, the malicious advertisement...

During the last few months, we’ve been watching an interesting twist in malware analysis. Cybercriminals recently developed a technique where, in some cases, malware can infect a device when the victim simply hovers their mouse over a malicious link. The dangers of clicking on a link...

Malicious email remains one of the most significant and ongoing computer security threats that we face. Cybercriminals use a variety of email-based attacks to deliver malware, lure victims to malicious websites, and steal logon credentials, and organizations everywhere need to understand these threats and how...