Cyberattack Tag

Malicious links are not new, but they continue to plague us. Research shows that a significant number of people will click on a link in an email, web page, or document without taking a second thought, and all too often, end up infecting their device...

As always, malware continues to grow in sophistication and power. Here’s another case in point. We’ve been closely following ransomware as it expands its primary focus from individuals to include businesses. Now we’re seeing the next evolution of this ugly form of crimeware. A recent wave...

Advanced malware solutions ("sandboxes") traditionally use virtual machines (VM) to analyze suspicious objects to find out if they are malicious. However, advanced malware is capable of detecting the presence of the virtual machine technology used by conventional sandboxes and leveraging this weakness to...