Emotet 101, stage 3: The Emotet executable

Credit to Author: hajnalkakope| Date: Tue, 05 Mar 2019 13:57:54 +0000

By SophosLabs Research Emotet&#8217;s arrival is usually preceded by a deceptive spam email, which has a malicious attachment. Opening the attachment starts a process which can lead to an Emotet infection. The Emotet application is an evolved binary, in the sense that it has gone through thousands of iterations over its existence. Its presence as [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/CfniXxu0bac” height=”1″ width=”1″ alt=””/>

Read more

Emotet 101, stage 2: The malicious attachment and killchain

Credit to Author: Andrew Brandt| Date: Tue, 05 Mar 2019 13:56:43 +0000

By SophosLabs Research The Emotet malware family is in a constant state of evolution and change. From day to day or week to week, the malware&#8217;s creators and distributors take an active role in changing up the killchain – the sequence of events that begins with a victim receiving a malicious file attachment, and ends [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/C8Iq5Z7cCTc” height=”1″ width=”1″ alt=””/>

Read more

Emotet 101, stage 1: The spam lure

Credit to Author: Andrew Brandt| Date: Tue, 05 Mar 2019 13:55:43 +0000

By SophosLabs Research Emotet operates on a mass scale. Everything it does, it does in bulk. A typical infection begins when the victim receives a specially crafted spam email. Emotet&#8217;s creators send these out by the thousands and, in some cases, the bots themselves send more. The lures employ mass-created malicious document files. The payload [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/7i2oOO4OT8A” height=”1″ width=”1″ alt=””/>

Read more

Key considerations for building vs. buying identity access management solutions

Credit to Author: Kayla Matthews| Date: Thu, 28 Feb 2019 16:00:00 +0000

Having a strong identity and access management solution is critical to the security of your organization. It ensures that the right people have access to your system—and keeps unauthorized users out. Should businesses build these solutions in-house or look to third-party vendors to fill the gap? Here are the factors to consider.

Categories:

Tags:

(Read more…)

The post Key considerations for building vs. buying identity access management solutions appeared first on Malwarebytes Labs.

Read more

What K–12 schools need to shore up cybersecurity

Credit to Author: Wendy Zamora| Date: Tue, 26 Feb 2019 13:00:00 +0000

We discuss the challenges facing K–12 schools looking to protect students’ data, and which solutions they can adopt in order to build up defenses and increase cybersecurity awareness.

Categories:

Tags:

(Read more…)

The post What K–12 schools need to shore up cybersecurity appeared first on Malwarebytes Labs.

Read more

The lazy person’s guide to cybersecurity: minimum effort for maximum protection

Credit to Author: Pieter Arntz| Date: Thu, 21 Feb 2019 17:00:00 +0000

How can we help our less tech-savvy friends stay more secure online? By giving them a lazy person’s guide to cybersecurity, we can offer maximum protection for minimal effort.

Categories:

Tags:

(Read more…)

The post The lazy person’s guide to cybersecurity: minimum effort for maximum protection appeared first on Malwarebytes Labs.

Read more

How does macOS protect against malware?

Credit to Author: Thomas Reed| Date: Thu, 21 Feb 2019 16:00:00 +0000

Mac users often are told that “Macs don’t get viruses.” This is not really true, of course. Macs can and do get infected. However, it is true that macOS provides some basic protection against malware. This protection can be quite effective in some ways, but, unfortunately, quite ineffective in others. Let’s take a look at…

Categories:

Tags:

(Read more…)

The post How does macOS protect against malware? appeared first on Malwarebytes Labs.

Read more

Good bots, bad bots: friend or foe?

Credit to Author: Christopher Boyd| Date: Wed, 20 Feb 2019 16:00:00 +0000

Bots are an endless source of debate online, but all we ever hear about are the bad ones. In this post, we look at some examples you’ve probably already run into, and explain why one person’s good bot is another organization’s bad one.

Categories:

Tags:

(Read more…)

The post Good bots, bad bots: friend or foe? appeared first on Malwarebytes Labs.

Read more