article thumbnail

LockFile ransomware uses intermittent encryption to evade detection

CSO Magazine

The threat uses what researchers from antivirus vendor Sophos call “intermittent encryption,” meaning it only encrypts chunks of data inside a file instead of its complete contents. Learn how recent ransomware attacks define the malware's new age and 5 reasons why the cost of ransomware attacks is rising. |

article thumbnail

Luna Moth callback phishing campaign leverages extortion without malware

CSO Magazine

The analysis discovered that the threat actors behind the campaign leverage extortion without malware-based encryption, have significantly invested in call centers and infrastructure unique to attack targets, and are evolving their tactics over time. Luna Moth removes malware portion of phishing callback attack.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Linux endpoint protection software

CSO Magazine

I've never felt a need for a Linux antivirus program. Mind you, in recent years we've seen an enormous increase in Linux malware. According to security company Crowdstrike, Linux malware increased by 35% in 2021 compared to 2020. According to security company Crowdstrike, Linux malware increased by 35% in 2021 compared to 2020.

article thumbnail

Webroot files patent infringement claim against Trend Micro

CSO Magazine

“This case involves patented technologies that helped to revolutionize, and have become widely adopted in, the fields of malware detection, network security, and endpoint protection” and are used in security products such as Webroot SecureAnywhere AntiVirus, it continued. To read this article in full, please click here

Marketing 126
article thumbnail

NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

The Last Watchdog

Unfortunately, despite steady advances in malware detection and intrusion prevention systems, and much effort put into training employees to be wary of suspicious email, weaponized email and document-based malware remain as virulent as pervasive as it was two decades ago. The key takeaways: Productivity vs. security. Effective attacks.

Malware 100
article thumbnail

Massive threat campaign strikes open-source repos, Sonatype spots new CursedGrabber malware

Security Affairs

Sonatype’s deep dive research allowed to identify a new family of Discord malware called CursedGrabber. This follows on the heels of last week’s news when Sonatype’s Nexus Intelligence engine and it’s release integrity algorithm discovered discord.dll : the successor to “ fallguys ” malware and 3 other components. and ac-addon.

Malware 134
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , data breaches , and cybercrime developments. Russian software engineer Eugene Kaspersky’s frustration with the malware of the 80s and 90s led to the founding of antivirus and cybersecurity vendor Kaspersky Lab.