Machine Learning For Cybersecurity Not Cybercrime

The cybersecurity industry has always been under constant strain from cybercriminals and malware. With increasing integration of hardware, software and services being built into every aspect of our lives, the task of keeping data secure has become even more difficult. The arsenal of tools that cybercriminals now have at their disposal has raised concerns for…

Decrypting CryptXXX version 3 — for free

In April 2016 a young and ambitious trojan cryptor known by the name CryptXXX was released. It was distributed by the infamous Angler and Neutrino exploit kits. It’s creators certainly hoped that after the release they could lay on the couch and watch the money flow from the victims pockets to their bitcoin wallets. But…

Ransomware took in $1 billion in 2016–improved defenses may not be enough to stem the tide

Increased user awareness of phishing threats, better antivirus technology, more industry-wide information sharing and cross-border efforts by law enforcement authorities will combine to turn the tide against ransomware this year, according to some security experts, but others expect the attacks to continue to increase. According to a security expert who requested anonymity, ransomware cyber-criminals took…

What to do if your data is taken hostage

Getting duped online by a cybercriminal is infuriating. You let your guard down for a minute and the thieves find their way in to your machine. And then the “fun” begins if ransomware is involved. Hopefully you have your data backed up, but if not now starts the dance with those who have ultimately taken…

InterContinental Hotels Investigating Possible Card Breach

British multinational hotel company InterContinental Hotels Group (IHG) has launched an investigation after being informed of a possible payment card breach at some of its properties in the United States. Investigative journalist Brian Krebs learned from his sources in the financial industry that a pattern of fraud had been observed on credit and debit cards…

Explained: Domain-Generating Algorithms

Cybercriminals use domain-generating algorithms to prevent their servers from being blacklisted or taken down. A domain-generating algorithm (DGA) is a program or subroutine that provides malware with new domains on demand or on the fly. Kraken was the first malware family to use a DGA (in 2008) that we could find. Later that year, Conficker made…