Security News

Most Post-Intrusion Cyber Attacks Involve Everyday Admin Tools (Threatpost)
2016-07-06 11:00

Ninety-nine percent of post-intrusion cyberattack activities leverage standard networking, IT administration and other tools as opposed to malware.

New CryptXXX Can Evade Detection, Outsmarts Decryption Tools (Threatpost)
2016-06-27 15:24

Latest CryptXXX ransomware variant masks itself as a DLL for video editing software and now can outsmart decryption tools.