The Latest News in Cybersecurity Right to Your Inbox Thank you!
You will now be notified when a new blog post is published.
Is Zero Day Java Exploit Detection Possible?
Java is an expansive, ubiquitous, platform agnostic infrastructure for delivering remote code to endpoint computers. That makes it a perfect malware distribution pipeline. It enables malware authors to take advantage of Java exploits to infect computers on a global scale. To make matters worse, security updates are not installed automatically when the Java updater launches, […]READ MORE
More Embedded Systems Havoc: ATM Hacks Target Endpoints Once Again
Recently, reports surfaced about new malware being used to hack ATM machines across the globe. The program, named Backdoor.MSIL.Tyupkin, creates a backdoor that bypasses the ATM’s security system and forces it to dispense cash. Though the hacks are primarily taking place in Russia and Europe, reports from the U.S., China, India, and Israel have also […]READ MORE
Why Anti-Exploitation Only Solves Part of the Endpoint Security Problem
In July Microsoft introduced an updated version of its Enhanced Mitigation Experience Toolkit (EMET), designed to protect against malicious and targeted attacks on its software. EMET aims to prevent software vulnerabilities from being successfully exploited. The most recent version employs Return-Oriented Programming protections (ROP), Export Address Filter (EAF) and EAF+ security, and Attack Surface Reduction […]READ MORE
Home Depot – Current Approach to Endpoint Security needs Major Renovation
Multiple sources are reporting that a targeted strain of malware has infiltrated the point-of-sale (PoS) systems of U.S. retailer Home Depot. It appears to be a very close variant of the Backoff malware that affected P.F. Chang’s last summer. Backoff itself was a variant of the malware the infiltrated Target’s systems in 2013. This latest […]READ MORE
Internet Explorer Vulnerability Kept Secret For Three Years
Security vulnerability research companies search for vulnerable applications and disclose their findings to application vendors, governmental agencies, and operating system vendors. Often this information costs a substantial fee. For example, vulnerable code found inside a browser, such as Internet Explorer or Chrome, can cost thousands of dollars. Agencies around the world typically pay high amounts of money in […]READ MORE
The case of the Gyges, the invisible Malware
Government-Grade now in the Hands of Cybercriminals In March 2014, the Sentinel Labs Research Lab detected a sophisticated piece of malware dubbed Gyges that is virtually invisible and capable of operating undetected for long periods of time. We first detected Gyges with our heuristic sensors and then our reverse engineering task force performed an in-depth […]READ MORE