Security

MalwareBytesSecurity

How to protect your RDP access from ransomware attacks

Credit to Author: Pieter Arntz| Date: Fri, 10 Aug 2018 16:13:18 +0000

Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control?

Categories:

Tags:

(Read more…)

The post How to protect your RDP access from ransomware attacks appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

This Week in Security News: Hijacks and Healthcare

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 10 Aug 2018 14:56:36 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Singapore looks into the effectiveness of virtual browsers in an attempt to reduce cyberattacks on healthcare systems. Also, cybercriminals have hijacked the computer servers of the Professional…

The post This Week in Security News: Hijacks and Healthcare appeared first on .

Read More
QuickHealSecurity

Again! A New .NET Ransomware Shrug2

Credit to Author: Ghanshyam More| Date: Fri, 10 Aug 2018 09:35:21 +0000

For several months, Quick Heal Security Labs has been observing an increase in ransomware which are built in  .NET framework. Ransomware like SamSam, Lime and now Shrug was found to be built in .NET framework. Malware authors are finding it very easy to build and obfuscate malware in .NET framework rather than making them in…

Read More
MicrosoftSecurity

Protecting the protector: Hardening machine learning defenses against adversarial attacks

Credit to Author: Windows Defender ATP| Date: Thu, 09 Aug 2018 20:00:05 +0000

Harnessing the power of machine learning and artificial intelligence has enabled Windows Defender Advanced Threat Protection (Windows Defender ATP) next-generation protection to stop new malware attacks before they can get started often within milliseconds. These predictive technologies are central to scaling protection and delivering effective threat prevention in the face of unrelenting attacker activity.

Read more

Read More
MalwareBytesSecurity

Osiris dropper found using process doppelgänging

Credit to Author: hasherezade| Date: Thu, 09 Aug 2018 18:52:57 +0000

Process doppleganging, a rare technique of impersonating a process, was discovered last year, but hasn’t been seen much in the wild since. It was an interesting surprise, then, to discover its use in a dropper of the Osiris banking Trojan. We unpack the code to show how malware authors used this process.

Categories:

Tags:

(Read more…)

The post Osiris dropper found using process doppelgänging appeared first on Malwarebytes Labs.

Read More