Coordinated Effort Underway To Take Down Trickbot Malware

Score one for the good guys. A team led by Microsoft’s DCU (Digital Crimes Unit) that includes Symantec, NTT Ltd, ESET, and Lumen’s Black Lotus Labs is working on something new. They have launched a sustained, coordinated attack on Trickbot’s infrastructure in a bid to destroy it, preventing the hackers …

New Windows 10 Update Shows App Warnings For Malware

A great many malware strains are designed to engage quietly during a PC’s startup process and then idle in the background. They are in the system logging keystrokes, taking screen shots at periodic intervals and uploading them to a command and control server, or doing other nefarious things. Microsoft wants …

Intel Adding Additional Security To Future Processors

Intel has had more than its share of challenges over the last couple of years. Not the least of which included a whole family of new attack vectors that made headlines and caused panic around the world. This happened as hackers discovered new ways to attack machines with ‘Intel Inside,’ …

Hacked Networks And Credentials Being Sold At Alarming Rates

Selling network access is big business on underground hacking websites. Even worse, the business is growing at an alarming rate, according to a report recently published by cyber security firm KELA. According to their report, the number of ads found on hacking forums advertising ‘Network Access’ tripled between August and …

Surge In Ransomware Continues In 2020, Targeting Healthcare

The year 2020 could well be described as the Year of Ransomware. Security researchers around the globe who monitor such things have noted a sharp uptick in the use of ransomware this year, with well known threats like REvil, Ryuk, and Maze being the most common variants deployed by hackers. …

New HEH Botnet Malware Can Destroy Devices It Attacks

Security researchers at Netlab have recently reported on their discovery of a terrifying new botnet on the web. Dubbed HEH, this botnet is a different sort of threat. Unlike most others, this one is not designed to launch DDOS attacks or install malicious code. Its purpose is much simpler, and …