In Part 1, we explained what Intel SGX enclaves are and how they benefit ransomware authors. In Part 2, we explore a hypothetical step-by-step implementation and outline the limitations of this method. Watch this live attack demo to see how the CrowdStrike Falcon® platform and the CrowdStrike Falcon Complete™ managed detection and response team protect against … [Read more...] about Playing Hide-and-Seek with Ransomware, Part 2
playing
Chrome extensions secretly playing videos
Yesterday morning, our solutions started giving many Google Chrome users repeated threat warnings. Trojan.Multi.Preqw.gen, which Chrome tried to download from a third-party site, was specified as the source of the threat. We explain what it’s all about and how to solve the problem. Malicious extensions Our experts in collaboration with their colleagues at Yandex discovered that … [Read more...] about Chrome extensions secretly playing videos
Stop playing whack-a-mole and put threats to rest with Cisco Stealthwatch Cloud
I was recently able to grab some time with a Cisco customer to hear about their experience with Cisco Stealthwatch Cloud, a SaaS-based Network Detection and Response (NDR) solution. Aspire Technology Partners, a Managed Security Service Provider, explained their use of the product for one of its customers that was in a dangerous situation involving some slippery malware … [Read more...] about Stop playing whack-a-mole and put threats to rest with Cisco Stealthwatch Cloud
Beware! Playing Untrusted Videos On VLC Player Could Hack Your Computer
If you use VLC media player on your computer and haven't updated it recently, don't you even dare to play any untrusted, randomly downloaded video file on it.Doing so could allow hackers to remotely take full control over your computer system.That's because VLC media player software versions prior to 3.0.7 contain two high-risk security vulnerabilities, besides many other … [Read more...] about Beware! Playing Untrusted Videos On VLC Player Could Hack Your Computer