HackDig : Dig high-quality web security articles for hackers

An analysis of Sodinikibi: The persistent ransomware as a service

If we take a look back, it is clear that one of the main features of ransomware as a threat is that it is continually reinventing itself, persisting in time and effectiveness. These types of attacks have evolved greatly since they first emerged, and today there are many different and varied families in existence. This also implies a greater effort from cyber
Publish At:2020-07-15 03:36 | Read:219 | Comments:0 | Tags:Malware PandaLabs advanced cybersecurity b2b report

Ryuk: How the ransomware that attacks businesses works

In 2019, ransomware was one of the key players of cybercrime. Companies and official organizations all around the world were hit by cyberattacks that used this kind of malware to encrypt their files and demand a ransom. These waves of ransomware used a range of variants to carry out the attacks. However, there is one variant that was used then, and that is s
Publish At:2020-04-15 06:23 | Read:620 | Comments:0 | Tags:Business Malware PandaLabs Ransomware report

Enterprise Security in the Age of Advanced Threats

The malware and IT security panorama has undergone a major change, and enterprise security will never be the same. Hackers have improved drastically, both in terms of volume and sophistication, new techniques are allowing threats to remain on corporate networks for much longer periods than ever before. Webinar  on the topic presented by Panda’s own Luis Cor
Publish At:2017-09-08 02:05 | Read:3004 | Comments:0 | Tags:PandaLabs advanced cybersecurity business webinar

PandaLabs Records a 40% Increase in Attacked Devices this Quarter

Traditional security solutions, although efficient in protecting against known malware, are incapable of protecting against attacks that use non-malicious tools and other advanced techniques. This argument has gained traction in recent investigations carried out by PandaLabs, the anti-malware laboratory at Panda Security. The laboratory presents its second q
Publish At:2017-08-01 10:30 | Read:3914 | Comments:0 | Tags:News PandaLabs cybersecurity Malware quarterly report

A Conversation with Daniel Monastersky, Expert in Cyber Law

“International cooperation and building awareness are necessary to achieving a more secure world,” Daniel Monastersky Security, in any of its dimensions or spheres, is the first responsibility of any government. In this age of hyperconnection and interoperability, new actors and risks have emerged that have forced governments to carry out major revisions and
Publish At:2017-07-03 16:15 | Read:3601 | Comments:0 | Tags:PandaLabs cybersecurity gdpr guest post legislation

GoldenEye/Petya Attack Spreads Rapidly, Recalling WannaCry

On June 27, 2017, a large-scale attack using a variant of the ransomware family known as GoldenEye affected much of the world. In addition to encrypting files on the computer, this ransomware family is characterized by encrypting the MBR when it has permissions, thus blocking full access to the computer. The attack can almost be seen as a replica of the much
Publish At:2017-06-28 07:20 | Read:3842 | Comments:0 | Tags:Malware News goldeneye PandaLabs petya Ransomware

Webinar: What’s Next for Targeted Attacks?

If there’s one thing that we’ve been repeating almost constantly this year, it’s that malware is evolving. And fast. But it might be more accurate to say that attacks themselves are evolving, and especially targeted attacks. As reported by Verizon in their 2017 Data Breach Investigations Report, malware was used in 51% of the cases in which there was a data
Publish At:2017-06-22 22:25 | Read:3758 | Comments:0 | Tags:PandaLabs targeted attacks webinar

Panda Security Warns of a New Phase in Cybertheft

Cybercrime is a very profitable and attractive business. This is a new phase of cyber theft that involves stealing money directly from banks, rather than from their customers, using phishing attacks to infect the computers of bank employees. The million-dollar question is: where are the largest sums of money? They are, without a doubt, in the financial insti
Publish At:2017-06-15 06:15 | Read:4379 | Comments:0 | Tags:News Panda Security adaptive defense bank ciberheists compan

WannaCry: Five Answers to One of the Worst Attacks in History

Since last month’s appearance of WannaCry, the network worm that wriggled its way around the world using the EternalBlue exploit and infected hundreds of thousands of computers with ransomware, we’ve been getting a lot of questions. As a cybersecurity company, we at Panda Security have made ourselves available as a source of information for other security co
Publish At:2017-06-01 22:05 | Read:3613 | Comments:0 | Tags:PandaLabs wannacry wannasaveu

A closer look at a 3.0 cyber-attack

How does WannaCry work? The WannaCry global attack, which hit 200,000 computers in at least150 countries a few days ago, has set a milestone in the history of cyber-crime, and has made businesses of all types more aware of the importance of having a good cyber-security defense to avoid having their reputation and balance sheet compromised. Today’s atta
Publish At:2017-05-23 17:10 | Read:3479 | Comments:0 | Tags:Malware Mobile News adaptive defense cybersecurity PandaLabs

Not Just WannaCry: the EternalBlue Exploit Gives Rise to More Attacks

Since EternalBlue was first published, has anyone else used it? Or only the creators of WannaCry? Before we answer that question, let’s take a look at the history of the vulnerability that gave way to the EternalBlue exploit. October 25, 2001: Microsoft launches the Windows XP operating system, one of the company’s biggest successes. It contains,
Publish At:2017-05-19 02:30 | Read:4541 | Comments:0 | Tags:PandaLabs cryptocurrency eternalblue wannacry exploit

PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecurity Trend

Pandalabs, the anti-malware laboratory at Panda Security, takes a look at some trends in the billion-dollar cybercrime industry and gathers the main data points for its quarterly report. Note that businesses are still the primary target with 2.45% of devices attacked, compared with 2.19% with domestic users. Hacking attacks that involve direct interaction wi
Publish At:2017-05-13 17:35 | Read:3688 | Comments:0 | Tags:News PandaLabs cybersecurity malware study

WYSIWYE: A User-Friendly Interface for Cybercrooks

What You See Is What You Encrypt. The trend of installing malware on corporate networks through the Remote Desktop Protocol is booming among cybercriminals. In the last few months we have analyzed several cases of ransomware attacks directed at companies from different European countries that share this methodology and are being perpetrated by the same attac
Publish At:2017-03-30 07:20 | Read:3705 | Comments:0 | Tags:PandaLabs interface Ransomware

Sticky Attacks: When the operating system turns against you

Cyber-attackers are always finding new ways of bypassing the protection systems installed on computers in order to avoid detection and steal user data. In that respect, Black Hat hackers have always turned to malware-based attacks (phishing, network worms, or the dreaded Trojans with ransomware as the most dangerous example) to reach their goals: break into
Publish At:2017-03-10 04:35 | Read:6200 | Comments:0 | Tags:News PandaLabs advanced cyber-security business sticky attac

RDPPatcher, the Attack that Sells Access to your Computer at a Low Price

In recent months, there’s been a significant uptick in PandaLabs reports of malware that is installed using a Remote Desktop Protocol (RDP). Every day, we witness thousands of infection attempts using ransomware, hijacking systems for bitcoin mining, etc., which all have one thing in common: access via RDP after gaining entry with credentials obtained using
Publish At:2017-02-16 09:25 | Read:3726 | Comments:0 | Tags:PandaLabs Malware news rdp


Tag Cloud