Ransomware Tag

RSAC 2018, one of the largest cybersecurity conference events in the world, is almost here. More than any other, this is the place where leading security companies, researchers, CISOs, and their staffs from across the globe come together to talk, learn, present, and speculate about...

NOTE: In this blog, we typically focus on specific aspects of malware, cybercrime, security threats, and network breaches. For this post, we thought we’d take a large step backward and provide some foundational information as context for understanding the capabilities and variations of today’s malware....

We were sitting around the campfire this week reading the latest Lastline Labs blogs post. We were ignited by some scorching questions regarding this shadowy malspam campaign. The burning issue on our minds was: Why would Smoke Loader go to the trouble of gaining a foothold...

By Oleg Boyarchuk and Stefano Ortolani Introduction When ransomware behavior is clearly exhibited, it is relatively easy for a sandbox or a personal A/V to assert detection; after all, in its simplest form, ransomware malware must at least: (1) search for files to be encrypted, and (2)...

One could argue that cybercriminals had a real break-out year in 2017. Huge data breaches, new malware techniques, and some headline-grabbing attacks. Our top 10 blog posts demonstrate the interest in what the bad guys are up to, and how to defend against it. From...