You've successfully subscribed to The CISO's Brief
Great! Next, complete checkout for full access to The CISO's Brief
Welcome back! You've successfully signed in.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info is updated.
Billing info update failed.

malware

US Cyber Command exposes ComRAT and Zebrocy new Russian malwares [45.1.2]

US Cyber Command exposes ComRAT and Zebrocy new Russian malwares [45.1.2]
Members Public

The US Cyber ​​Command has shared 8 samples of malware developed and deployed by Russian hackers recently.

Analysts team
malware
Global cyber community can do more to stop state-sponsored malware [44.1.4]

Global cyber community can do more to stop state-sponsored malware [44.1.4]
Members Public

Cooper Quintin, a security researcher and programmer at the Electronic Frontier Foundation (EFF), told CyberTalks on Friday that the security community needs to dig deeper on state-sponsored malware.

Analysts team
state
US sanctions a Russian government institution in connection with Trisis malware [44.1.5]

US sanctions a Russian government institution in connection with Trisis malware [44.1.5]
Members Public

On Friday the US Treasury Department announced sanctions against a Russian government research institute linked to a strain of the world's most dangerous destructive malware.

Analysts team
malware
This new malware uses remote overlay attacks to hijack your bank account [43.2.3]

This new malware uses remote overlay attacks to hijack your bank account [43.2.3]
Members Public

Yesterday, researchers published their discovery of a new malware using remote overlay attacks. In Brazil for now, but might come to you next.

Analysts team
malware
The behavior of most common malicious email attachments infecting Windows [42.1.1]

The behavior of most common malicious email attachments infecting Windows [42.1.1]
Members Public

To counter malware, it can make a difference to know the malicious attachments that are commonly used in phishing emails to distribute malware. Each malware has specific attachment behavior.

Sylvan Ravinet
Sylvan Ravinet
attachments