Locky ransomware is back, but we already protect against it

By Malwarebytes Labs In our Q1 2017 Tactics and Techniques report, we mentioned that the Locky ransomware had mysteriously vanished. Indeed, for a while, it completely disappeared and allowed for Cerber to take the number one spot as the most distributed piece of ransomware (and malware for that matter). However, the group controlling the Necurs botnet has just opened the spam floodgates again … [Read more...]

Elusive Moker Trojan is back

By Malwarebytes Labs Some time ago we observed a rare, interesting malware dropped from the Rig-v EK. Its code was depicting that it is written by professionals. Research has shown that it is a sample of Moker Trojan that was discovered in 2015 (read more here). However, for a long time, we could not find a sample with working CnC in order to do a deeper research. Finally, we found such a sample … [Read more...]

DOUBLEPULSAR Backdoor Detection with Nessus and PVS

By Lucas Tamagna-Darr Last week many of us in the industry were busy investigating a large cache of weaponized software exploits and payloads released by the ShadowBrokers group. One particular payload that received much attention was the DOUBLEPULSAR implant. DOUBLEPULSAR is a covert command and control channel that can be used to control a compromised target. While many of the exploits that … [Read more...]

Choose a high performance Virtual Backup solution built for small & mid-market businesses

Altaro VM Backup is a fast, affordable, high performance backup solution, specially developed for small and mid-market businesses. We’ve cut the waste and hassle to give you an agile, streamlined solution that is easy to implement, feature-rich, with outstanding support as part of the package. Read more at http://www.altaro.com/vm-backup/ … [Read more...]

Creating Simple Rules for Complex Decisions

Machines can now beat humans at complex tasks that seem tailored to the strengths of the human mind, including poker, the game of Go, and visual recognition. Yet for many high-stakes decisions that are natural candidates for automated reasoning, like doctors diagnosing patients and judges setting bail, experts often favor experience and intuition over data and statistics. This reluctance to adopt … [Read more...]

Binary Options malvertising campaign drops ISFB banking Trojan

By Jérôme Segura We have been witnessing a series of malvertising attacks that keep a low profile with decoy websites and strong IP address filtering. We are calling it the ‘Binary Options' campaign because the threat actor is using the front of a trading company to hide the real nature of his business. There have been similar uses of fake façades as a gateway to exploit kits. For instance, … [Read more...]

Master Your Security Foundation: Know Your Devices

By Ted Gary Knowing what assets you have is arguably the single most important security control. If you don't know about a server, desktop, laptop, mobile device or network device, how can you manage and secure it? For that matter, what about cloud instances, virtual machines, and containers? Fewer than 50% of surveyed organizations have implemented automated controls to inventory the systems … [Read more...]

Performance Impact of Hyper-V CPU Compatibility Mode

By Eric Siron There's little documentation on how Hyper-V CPU compatibility mode works. Does it impact the performance of a virtual machine? Learn all about it here.Read the post here: Performance Impact of Hyper-V CPU Compatibility Mode Source:: altaro … [Read more...]

Happy Earth Day!

By Kayla Myrhow Jump-start your Earth Day efforts with properly recycling your electronics AKA e-cycling! It's incredibly easy to think environmentally responsible when it comes to your electronics. We're happy to encourage and inform others about how-to dispose of your electronics in an environmentally safe fashion: Here is your Earth Day How-To: Most Important rule of e-cycling: Do [...] The … [Read more...]

Need an IAM Solution? Make Sure It Has the Right Foundation

By Thycotic Team Guest column by SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. In today's highly distributed IT world, where organizations must … [Read more...]