Blog

By Teresa Wingfield 2017 was a busy year for hackers who used new, ingenious attack vectors and methods such as fileless malware to hold organizations ransom and steal their sensitive data. These threats are almost certain to continue in 2018 and, along with them, there will be even bigger challenges. What’s in Store for 2018? Five […]

By Gili Moller Security flaws in Intel and AMD processors, known as Meltdown and Spectre, allow unauthorized access to memory. These types of vulnerabilities once again highlight the need for an in-depth defense approach to endpoint protection and the importance of operating system updates. As the Microsoft update released on January 3, 2018  affects the […]

By Rene Kolga What has happened? A security flaw in Intel processors known as Meltdown announced on January 3, 2018 makes it possible to determine the content or layout of protected kernel memory. On the same day, another flaw dubbed Spectre was revealed that also allows access to information in protected memory. Spectre affects Intel, AMD […]

By Teresa Wingfield  Like most organizations, you’ve probably deployed multiple endpoint security controls with various levels of success. Still, you never seem to get completely ahead of quickly evolving threats. Your organization’s endpoints get infected by malware, occasional ransomware and you have to deal with unwanted downtime on a regular basis. Why Isn’t Your Endpoint […]

By Teresa Wingfield Many security vendors are saying that fileless malware doesn’t call for panic.  They claim that their solutions using machine learning or artificial intelligence or whitelisting or deception or threat hunting can stop the next fileless attack.  You’ve probably already deployed at least one or more of these products in your organization. Pardon […]

The “CryptoMix” ransomware family has been around since 2016, but new variants show up almost every week. One recent variant is “CryptoMix Arena”. Like other variants, “CryptoMix Arena” ransom requests bitcoins which allegedly buy you a decryption tool. Unlike other variants that usually receive the encryption public-key from their Command and Control (C&C) server, this […]

By Nyotron Security Research Team A recently discovered ransomware family called GIBON, targets all of a user’s directories apart from files located in the Windows folder and its subfolders. This malware spreads through email phishing. Upon infection, the ransomware updates the Command and Control (C&C) server with an infected victim message that is Base64 encoded, […]

By Donna St. John – Vice President of Marketing, Nyotron What does every cyberattack since Stuxnet have in common? Regardless of the method of the attack, the attacker bypassed the multiple layers of security technologies, penetrated the network and wreaked havoc to the organization. Once inside, the intention of the hacker is always to steal, […]

By Nyotron Security Research Team Should we sympathize with hunters when they become the hunted? A particular malware dubbed “Cobian RAT,” seems to raise this question. This software’s target audience is comprised of “skids” (script kiddies) that are often characterized as want to-be hackers, using other people’s tools to infiltrate and compromise systems without the […]

By Nyotron Security Research Team RATs (Remote Access Trojan) are fairly common in the Trojan market and differ from each other mostly by the features they provide. Almost all of them give the attacker the ability to send remote commands using the command prompt, key log the victim’s keystrokes, take screenshots, send/receive files to/from the […]

Subscribe to our blog

Follow us on Social Media