Category Archives: Malware

Cloudmark’s Security Threat Report, 2016 Q1

Cloudmark’s Security Threat Report for Q1 of 2016 is now live. This quarter we cover: Characteristics of and methods used in script-based Locky ransomware attacks The Locky family’s explosion onto ransomware scene in Q1 due to aggressive distribution A look at the regions most impacted by Locky Analysis of Locky attacks sent to Japan, the […]

Apple OS X Ransomware Delivered by Trojanized Transmission App

The short: A newly discovered ransomware-delivering trojan for Apple’s OS X operating system may have infected several thousand users over the weekend. The trojan, OS X.KeRanger.A, was delivered via a malicious build of the Mac OS X bittorrent client ‘Transmission’ and will begin encrypting victims’ local files today after a 3 day waiting period. This […]

Cloudmark’s Annual Global Threat Report for 2015

Cloudmark’s Annual Threat Report for 2015 is now available and covers the following topics: A look at how enterprises are trying to combat spear phishing and how well these attempts succeed or fail, according to a new survey of 300 companies How the Swizzor malware propagates by camouflaging itself to evade spam filters The risks for brands […]

Spear Phishing: The Secret Weapon Behind the Worst Cyber Attacks

To users, spear phishing emails may seem like innocent requests for information or other forms of benign contact, potentially appearing to even come from a person or company a user is friendly or familiar with. But for attackers, spear phishing emails are most often the best way to get the keys to the kingdom. Most […]

2016 Security Predictions

The stream of massive data breaches continued in 2015. It seems that no sector was immune to hacking: banks, government, dating sites, healthcare, ISPs, and even security companies were compromised. Anywhere there was sensitive data hackers were trying to obtain it, and in many cases they succeeded. However, hacking is not entirely without risks, and […]

Using DNS for “Local” Threat Intelligence

In a session I attended at the RSA Conference in San Francisco, one of the panelists was asked a question in the Q&A section about detecting malware that stays entirely in memory, i.e. Avoiding detection by never writing itself to disk. The panelist’s answer was insightful; he stated that malware still needs to communicate with […]

Cloudmark’s 2015 Q1 Global Threat Report

With articles on the rise and fall of a major spammer, the pros and cons of DNSSEC, Canada’s Anti Spam Law, ransoming your data, home router compromises, and casino advertising that went too far, Cloudmark’s Threat Report for 2015 Q1 covers the latest in the cyber threat landscape. We normally imagine that most spam sent […]

Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2017 Cloudmark, Inc.