Top IT Security Bloggers

Symantec Security Response Blogs
  • Trident: Trio of iOS zero-days being exploited in the wild

    Symantec Security Response Blogs
    Users of iPhones and other iOS devices are advised to upgrade to the latest version of the operating system.






    Twitter Card Style: 
    summary


    Three zero-day vulnerabilities in Apple’s iOS mobile operating system are being exploited in the wild in targeted attacks. The vulnerabilities, collectively dubbed “Trident”, can be exploited by attackers to remotely jailbreak Apple iOS devices and install malware.
    read more
  • Non-existent video involving Hillary Clinton and ISIS leader used as bait in malicious spam

    Symantec Security Response Blogs
    Malicious attachment contains Adwind cross-platform remote access Trojan.






    Twitter Card Style: 
    summary


    Contributors: Paul Mangan, Kevin Savage
    Cybercriminals are using clickbait, promising a video showing Democratic Party presidential nominee Hillary Clinton exchanging money with an ISIS leader, in order to distribute malicious spam emails.
    read more
  • Equation: Has secretive cyberespionage group been breached?

    Symantec Security Response Blogs
    A new attack group has released a data dump of leaked exploits and hacking tools they claim belong to the Equation group.






    Twitter Card Style: 
    summary


    An attack group calling itself the Shadow Brokers has released a trove of data it claims to have stolen from the Equation cyberespionage group. The data contains a range of exploits and tools they state were used by Equation.
    read more
  • Shark: New Ransomware-as-a-Service threat takes big bite of proceeds

    Symantec Security Response Blogs
    The creators of Shark have made it freely available, but demand an 80 percent cut of its profits.






    Twitter Card Style: 
    summary


    A new type of ransomware known as Shark (Trojan.Ransomcrypt.BG) is being distributed on the cyberunderground.
    read more
  • Instagram accounts hacked, altered to promote adult dating spam

    Symantec Security Response Blogs
    Scammers are hacking Instagram accounts and altering profiles with sexually suggestive imagery to lure users to adult dating and porn spam.






    Twitter Card Style: 
    summary


    Earlier this year, we reported an influx of fake Instagram profiles luring users to adult dating sites. Over the last few months, we have observed Instagram accounts being hacked and used to promote adult dating spam.
    read more
  • Microsoft Patch Tuesday – August 2016

    Symantec Security Response Blogs
    This month the vendor is releasing nine bulletins, six of which are rated Critical.






    Twitter Card Style: 
    summary



    Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing nine bulletins, six of which are rated Critical.
    As always, customers are advised to follow these security best practices:
    read more
  • Strider: Cyberespionage group turns eye of Sauron on targets

    Symantec Security Response Blogs
    Low-profile group uses Remsec malware to spy on targets in Russia, China, and Europe.






    Twitter Card Style: 
    summary_large_image


    A previously unknown group called Strider has been conducting cyberespionage-style attacks against selected targets in Russia, China, Sweden, and Belgium. The group uses an advanced piece of malware known as Remsec (Backdoor.Remsec) to conduct its attacks.
    read more
  • New ransomware mimics Microsoft activation window

    Symantec Security Response Blogs
    A new ransomlock variant, which mainly affects the US, tricks users into calling a toll-free number to reactivate their Windows computer.






    Twitter Card Style: 
    summary


    Symantec has discovered a new ransomware variant that pretends to originate from Microsoft and uses social engineering techniques to trick the victim into calling a toll-free number to “reactivate” Windows. In this case reactivating Windows means unlocking their computer.

    Additional Authors: 


    sam kim


    read more
  • Latest Intelligence for July 2016

    Symantec Security Response Blogs
    Our latest intelligence reveals that the Neutrino toolkit’s activity rose more than 10 percentage points in July.






    Twitter Card Style: 
    summary


    The Latest Intelligence page has been refreshed through July 2016, providing the most up-to-date analysis of cybersecurity threats, trends, and insights concerning malware, spam, and other potentially harmful business risks. Here are some key takeaways from this latest batch of intelligence.
    read more
  • Backdoor.Remvio: Highly customizable remote access Trojan sold online

    Symantec Security Response Blogs
    The new Trojan can be used to steal information and passwords from compromised computers.






    Twitter Card Style: 
    summary


    Symantec recently noticed that an Italian malware author called z3r0 is selling a new remote access Trojan in an underground forum. The software is a back door threat that can be purchased for somewhere between US$58 and $389 in bitcoins depending on the license agreement.
    read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place