Month: June 2019

MalwareBytesSecurity

Chernobyl’s lessons for critical-infrastructure cybersecurity

Credit to Author: Seth Rosenblatt| Date: Fri, 21 Jun 2019 15:30:00 +0000

The Parallax’s Seth Rosenblatt shares his story on the root cause of the Chernobyl disaster and the lessons organizations—especially those in nuclear power—can take away to secure critical infrastructure against a rising tide of cyberattacks.

Categories:

Tags:

(Read more…)

The post Chernobyl’s lessons for critical-infrastructure cybersecurity appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Radiohead’s ransom response shows novel approach for ransomware victims

Credit to Author: David Ruiz| Date: Thu, 20 Jun 2019 17:20:30 +0000

Last week, British rock bank Radiohead thwarted an attempted digital ransom, in which unnamed hackers stole roughly 18 hours of unreleased music dating back to the band’s recording of its studio album OK, Computer, revealing some less-than-ok computer security (sorry).

Categories:

Tags:

(Read more…)

The post Radiohead’s ransom response shows novel approach for ransomware victims appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

New Mac cryptominer Malwarebytes detects as Bird Miner runs by emulating Linux

Credit to Author: Thomas Reed| Date: Thu, 20 Jun 2019 15:33:38 +0000

A new Mac cryptominer we call Bird Miner was found on pirated music production software that interestingly runs via Linux. Learn how this unique malware attempts, and ultimately fails, at using stealth techniques.

Categories:

Tags:

(Read more…)

The post New Mac cryptominer Malwarebytes detects as Bird Miner runs by emulating Linux appeared first on Malwarebytes Labs.

Read More
MicrosoftSecurity

Inside out: Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection

Credit to Author: Eric Avena| Date: Mon, 24 Jun 2019 15:00:55 +0000

While Windows Defender Antivirus makes catching 5 billion threats on devices every month look easy, multiple advanced detection and prevention technologies work under the hood to make this happen. Multiple next-generation protection engines to detect and stop a wide range of threats and attacker techniques at multiple points, providing industry-best detection and blocking capabilities.

The post Inside out: Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection appeared first on Microsoft Security.

Read More