ransomware
The General Behavior of Ransomware
5 min read
This is the first in a series of blogs about advanced malware Behavioral Indicators Morph Over Time A large part of Threat Grid’s efficacy in determining the nature of a submitted file is through the use of over 675 indicators to identify malware. The initial indicators created for AMP Threat Grid sought to identify strictly […]
Cybersecurity for Education: Learn from the Experts
1 min read
Don’t miss the chance to learn how to better protect your school – register now for our cybersecurity webinars for K-12 and higher education!
Cybersecurity in Education: Threats Impacting K-12 and Higher Education
2 min read
Cisco has numerous resources for education institutions to learn how to properly enforce security based on industry best practices.
Cybersecurity in Education: Critical Information Held Hostage
2 min read
Ransomware is changing the game. Cybercriminals have learned how valuable our data is to us, and how much we’d pay to get it back.
Gotta be SWIFT for this Spam Campaign!
1 min read
Talos have observed a large uptick in the Zepto ransomware and have identified a method of distribution for the Zepto ransomware, Spam Email. Locky/Zepto continue to be well known ransomware variants and as such we will focus on the spam email campaign. We found 137,731 emails in the last 4 days using a new attachment […]
Cryptolocker 4 White Paper Available: The Evolution Continues
1 min read
We are pleased to announce the availability of the cryptolocker 4 white paper. Over the past year, Talos has devoted a significant amount of time to better understanding how ransomware operates, its relation to other malware, and its economic impact. This research has proven valuable for Talos and led the development of better detection methods […]
Widespread JBoss Backdoors a Major Threat
1 min read
With around 2100 servers affected, there are a lot of stories about how this happened. But a consistent thread in them all is the need to patch.
Ransomware: Past, Present, and Future
1 min read
The rise of ransomware over the past year is an ever growing problem. Business often believe that paying the ransom is the most cost effective way of getting their data back – and this may also be the reality. The problem we face is that every single business that pays to recover their files, is […]
Detecting Ransomware From The Outside Looking In
2 min read
Most malware analysis technologies, like sandboxes, put some sort of hook or software inside their analysis environment in order to observe what is actually happening. This could be a specific DLL file, or a debugger. The problem with this approach is that malware authors are aware of it, they look for it, and they build […]
2