Advanced Malware Detection Tag

Malware and cybercrime continue to grow at alarming rates. Unfortunately, the world-wide shortage of security talent is making it very difficult for organizations to find the resources necessary to defend themselves. Given the lack of available experts, businesses need to do everything they...

Advanced malware uses a number of techniques to avoid being detected by a sandbox. One method is to stall. When a malicious object discovers that it's under evaluation, it will postpone evil behavior until the sandbox times out. The malware simply hides its...

Today's advanced malware will attack at multiple locations throughout an enterprise. To be effective, powerful malware detection capabilities must be integrated throughout an organization's entire network and security infrastructure.   Malware uses many routes or attack vectors to gain access to an...

There's no question that cybercriminals benefit from the knowledge, tools, and experience of other hackers. They often band together to form powerful crime rings, sharing their techniques and the latest network vulnerability information. If we are to be successful battling these formidable adversaries, the security industry...

Exploit Kits are a serious cyber threat today and are responsible for the vast majority of malware infections worldwide.  Exploit kits are sophisticated but malicious programs designed and distributed by cyber criminals. They help fraudsters, hackers, and data thieves breach an organization's...

If the past is any predictor of the future, we can expect a dramatic surge of malware infections during the next several weeks. Historically, the number of malware infections has increased significantly during November and December. This annual spike is primarily driven...

Ransomware is a growing problem for organizations of all sizes. Earlier this year, the FBI projected that in 2016, ransomware victims would pay $1Billion dollars to recover their data. For many cyber thieves, ransomware has become the preferred crime, surpassing even credit card...

Most malware detection systems identify malicious code by monitoring its execution in a sandbox environment to detect anomalous behavior. As the malware runs, the sandbox searches for signs of odd or unauthorized actions like: Elevating privileges to "administrator" or "root" when the program doesn't ordinarily...