• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Search Results for: advanced malware

Advanced Lingering Malware – Daily Security Byte EP. 270

June 9, 2016 By Corey Nachreiner

Microsoft's Background Intelligent Transfer Service helps Windows and other programs quietly deliver updates in the background, without taxing your network bandwidth. Unfortunately, cyber criminals have also figured out how to exploit it to continually reinstall malware on a cleaned computer. Watch the video below to learn more. (Episode Runtime: 4:08) Direct YouTube … [Read more...]

AutoIt Malware: To obfuscate, or not to obfuscate

June 29, 2021 By Abdul Samee

What is malware? Its goal is to bypass computer defenses, infect a target, and often remain on the system if possible. A variety of evasion techniques depend on a mix between the skill of the author and the defenses of the intended victim. One of the most widely used tactics in malware is obfuscation. Obfuscation comes in the form of packers, crypters, and string manipulation, … [Read more...]

Analyzing a Fileless Malware Loader

October 15, 2020 By Trevor Collins

Thanks to WatchGuard’s Panda Adaptive Defense 360 zero-trust service, WatchGuard Threat Lab was able to identify and stop a sophisticated fileless malware loader before execution on the victim’s computer. Upon further detailed analysis by our attestation team, we identified several recent browser vulnerabilities that the malware targeted as part of its exploit chain.   Malware … [Read more...]

Does Your Network Box Block All Malware

April 6, 2020 By Trevor Collins

LED internet security lock and unlock symbols

  Last week, researchers at Mimecast posted an article that detailed an increase in the LimeRAT malware hidden in Excel spreadsheets. If you’ve followed our quarterly security reports, you’ll remember we have also found an increase in the use of Excel spreadsheets to release malware. Find out more about this increase of malware in Excel in our latest … [Read more...]

Defeat Cryptojacking Malware with Responsive Automation

February 27, 2020 By Stephen Helm

Automation Core Animation

Responsive automation makes it possible to shorten time to detection and accelerate response by automating processes that typically require a skilled security analyst. For my money, there are few better examples of the value of responsive automation than the threat of cryptojacking malware. Cryptojacking malware infects a system with the goal of generating Bitcoins using the … [Read more...]

Next Page »

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • Here Come The Regulations
  • Cybersecurity’s Toll on Mental Health

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use