Top IT Security Bloggers

Symantec Security Response Blogs
  • Avalanche malware network hit with law enforcement takedown

    Symantec Security Response Blogs
    Symantec plays part in takedown of the Avalanche malware-hosting network.



    Blog Feature Image: 


    globepoints.jpg






    Twitter Card Style: 
    summary


    The Avalanche malware-hosting network has been dealt a severe blow following the takedown of infrastructure used by at least 17 malware families.
    read more
  • Shamoon: Back from the dead and destructive as ever

    Symantec Security Response Blogs
    Malware hit targets in Saudi Arabia and was configured to wipe disks on November 17.






    Twitter Card Style: 
    summary


    Shamoon (W32.Disttrack), the aggressive disk-wiping malware which was used in attacks against the Saudi energy sector in 2012, has made a surprise comeback and was used in a fresh wave of attacks against targets in Saudi Arabia.
    read more
  • Mirai: New wave of IoT botnet attacks hits Germany

    Symantec Security Response Blogs
    New variant of malware used in attacks that knocked 900,000 home internet users offline.



    Blog Feature Image: 


    exploit_skull.jpg






    Twitter Card Style: 
    summary


    A new wave of attacks involving the Mirai botnet has crippled internet access for nearly a million home users in Germany. The latest attacks used a new version of the Mirai malware (Linux.Gafgyt.B) which is configured to exploit a weakness found in routers widely used in Germany.
    read more
  • Gatak: Healthcare organizations in the crosshairs

    Symantec Security Response Blogs
    Mysterious threat group infects organizations using malicious key generators for pirated software.






    Twitter Card Style: 
    summary


    The group behind the Gatak Trojan (Trojan.Gatak) continues to pose a threat to organizations, with the healthcare sector in particular heavily affected by attacks. Gatak is known for infecting its victims through websites promising product licensing keys for pirated software.
    read more
  • Android banking malware whitelists itself to stay connected with attackers

    Symantec Security Response Blogs
    New Android.Fakebank.B variants use social engineering to bypass a battery-saving process and stay active in the background.






    Twitter Card Style: 
    summary


    Recent variants of Android.Fakebank.B have been updated to work around the battery-saving process Doze. The variants display a pop-up message asking the user to add the threat to the Battery Optimizations exceptions whitelist.
    read more
  • Latest Intelligence for October 2016

    Symantec Security Response Blogs
    Number of new malware variants rises to over 96 million and global spam hits highest rate in nearly a year.






    Twitter Card Style: 
    summary


    Some of the key takeaways from October’s Latest Intelligence, and the threat landscape in general, include a sudden spike in new malware variants, spam reaching the highest rate in almost a year, an infamous DDoS botnet, and the discovery of a new Trojan used in high-level financial attacks.

    Click to Tweet: 


    Number of unique malware variants seen jumped significantly in October to 96.1 million

    Global spam rate in October reached highest level in almost a year



    Click to Tweet Acct: 


    @threatintel

    @threatintel


    read more
  • New BEC scams seek to build trust first, request wire transfer later

    Symantec Security Response Blogs
    Business email compromise scammers have gradually changed their tactics to improve their scam success rate.






    Twitter Card Style: 
    summary


    Symantec has been continuously tracking scam emails targeting businesses with fake wire transfer requests, and found that scammers behind these Business Email Compromise (BEC) emails have added some tricks to increase their chances of success.

    Click to Tweet: 


    New wave of #BEC scams seek to build trust with victims before making wire transfer requests



    Click to Tweet Acct: 


    @threatintel


    read more
  • Microsoft Patch Tuesday – November 2016

    Symantec Security Response Blogs
    This month the vendor is releasing 14 bulletins, six of which are rated Critical.






    Twitter Card Style: 
    summary



    Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing 14 bulletins, six of which are rated Critical.
    As always, customers are advised to follow these security best practices:
    read more
  • Mirai: what you need to know about the botnet behind recent major DDoS attacks

    Symantec Security Response Blogs
    Botnet has grown by exploiting weak security on a range of IoT devices.






    Twitter Card Style: 
    summary


    A distributed denial of service attack (DDoS) on DNS provider Dyn last week managed to disrupt an array of the internet’s biggest websites, including Spotify, Twitter, and PayPal.
    read more
  • Android ransomware gets around auto-start restrictions by pretending to be a launcher

    Symantec Security Response Blogs
    The latest Android.Lockscreen variants declare their activity as part of the launcher category to get around Android's security restrictions.






    Twitter Card Style: 
    summary


    New variants of Android.Lockscreen are using a simple, yet effective technique to improve their chances of successfully compromising devices.

    Click to Tweet: 


    Android.Lockscreen variant masquerades as launcher to sidestep security restrictions



    Click to Tweet Acct: 


    @threatintel


    read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release