Security Blog

Anonymous's picture
Written by
Trygve Brox
Clicking buttons for a living – With the huge and ever-growing volume of malicious samples we see today, automation has become increasingly important. Security vendors and companies with an interest in securing their networks expend more and more resources analyzing files and network traffic looking for malware, targeted attacks and other threats.
Anonymous's picture
Written by
Caleb Pope
RSA recently announced the newest iteration of banking Trojan – “KINS” (see below). Despite its efforts for vm detection, this commercially available variant’s behavior was processed in our Malware Analyzer G2, including the rerunning of its dropped files and its active connection with C&C.
Anonymous's picture
Written by
Caleb Pope
Information is Beautiful recently released a visualization of the “World’s Biggest Data Breaches” allowing for filtration between sector, tactic and sensitivity. Although this only displays the data of known breaches of more than 30,000 records, it is apparent that the concept of common-sector targets is no longer true.
Chris Larsen's picture
Written by
Chris Larsen

I've always had a weakness for the kooky domain names that some Bad Guys register.

Today while I was browsing through some of our spam logs, I found a batch that I had to share. (Actually, several batches...)

 

Chris Larsen's picture
Written by
Chris Larsen

Although mobile malware has been a hot topic for a couple of years now, we're still very much in the early phase of adapting to life on this new frontier. In some ways, the mobile malware world is quite different from traditional desktop/laptop malware.

One of these ways is in the lifespan of malicious sites, and today I'll highlight a couple of examples that illustrate this.

Chris Larsen's picture
Written by
Chris Larsen

Here are a couple of interesting sites:

screenshot of site number one

and

screenshot of site number two