A researcher who helps doctors diagnose patients with artificial intelligence, and three companies that have led mass protests against violence against women - these are just three examples of the groundbreaking young people who make up the 2019 cycle of our 30Under30 project.
CoinMiners are on the rise, trending so high that in the last couple of month they almost completely replaced ransomware in both media and the research community. Unlike ransomware which profit from rapid encryption of user’s data taken hostage, CoinMiners profit comes from high jacking computer resources. As long as the CoinMiner stays undetected and stealth, the higher its author profit. \nIn this talk we will focus on the unexplored territory of CoinMiner evasive maneuver and functionality to avoid getting found by its victims and provide tactics and tools to combat them.
There are different well-known services that allow us to analyze a file in search of viruses, also URLs (addresses of websites) or even hashes. Now, we can even scan files for malware from the popular Telegram messaging application and the MalScanBot bot.
MalScanBot, created by Omri Moyal, and integrates with Intezer Analyze to provide a convenient chat-based malware analysis. We encourage you to write your own plugins with your preferred tools, and to publish them for the benefit of the security community.
Haaretz - The little twist that turned a simple hacker attack into a particularly dangerous one (Hebrew):
A North American Chamber of Commerce has become a target for criminals who have tried to infiltrate a Trojan horse into corporate computers; Their method proved that sometimes the technique can be much more important than technology.
How to build a community of thousands of incredible malware researchers.
MalScanBot is an initiative by Omri Moyal (@GelosSnake), to scan malware in Telegram bot. It’s possible to get Intezer’s detection through this interface.
Irena Damsky & Omri Moyal’s ‘Stories From The Dark Side Of Managing A Security Research Department In A Start-Up’
GhostMiner Uses Fileless Techniques, Removes Other Miners, But Makes Only $200.
Fileless cryptomining malware has code that kills itself and other strains.
CVE-2018-4878 (Flash Player up to 184.108.40.206) and Exploit Kits
Modified video games on Russian forum tainted with WaterMiner cryptominer.
Malware Author Can’t Keep His Mouth Shut on Social Media.
КИБЕРПРЕСТУПНИК ВНЕДРИЛ МАЙНЕР ВАЛЮТЫ MONERO В МОД ДЛЯ GTA
Nuclear Posture Review allows nuclear response to cyber.
The Evasive Threat Is Now Mainstream
Minerva Labs brings a new paradigm to malware detection by preventing malware execution by using the malware’s strengths against it.
While going nuclear in response to a cyberattack might be a good sound bite, cyber execs say building a stronger defense is a smarter path.
A recent health IT conference was a forum for health IT and cybersecurity vendors to reach healthcare organizations and potential customers; the HIT Squad talks with the vendors.
Artificial intelligence, usually in the form of machine learning (ML), is infosecurity’s current buzz. Many consider it will be the savior of the internet, able to defeat hackers and malware by learning and responding to their behavior in all-but real time. But others counsel caution: it is a great aid; but not a silver bullet.
Israeli cyber security startup Minerva today announced a $7.5 million financing round led by Amplify Partners.
Omri Moyal, is speaking on the ‘Cloud & Data Storage’ session at the upcoming NetDiligence Cyber Risk & Privacy Liability Forum.
\nIn the world of cyber security there is no time to waste. Zero day vulnerabilities and critical alerts keep security professionals busy around the clock, and the sense of urgency never fades. Security professionals struggle with securing their network, deploying a vast array of cyber security tools. But, instead of relieving their stress, every new tool creates another constant stream of alerts, often wasting the security teams time and increasing their frustration. This Tool Talk will demonstrate the capabilities of the attacker, the five minute process to create zero day malware which eludes known security defenses, and an approach that prioritizes prevention of malware without the need to detect it first.
The major ransomware attack that spread across the world in late June struck large pharmaceutical companies, Chernobyl radiation detection systems, the Kiev metro, an airport, banks, hospitals and government agencies. Was this a financially motivated cyber attack or something more sinister? Is the worst over or is there more to come?
A moment of clarity can make the difference between a serial award winning startup and just another hardworking collection of coders, it seems.
One administrator shares his war stories for surviving ransomware attacks.
Security researchers are seeing an ever-increasing number of suspicious file samples that are experimenting with the Meltdown and Spectre vulnerabilities.
Cybersecurity experts say the best way to counter an infection is to be prepared and have backup systems in place.
\nIn the world of cyber security there is no time to waste. Zero day vulnerabilities and critical alerts keep security professionals busy around the clock, and the sense of urgency never fades. Security professionals struggle with securing their network, deploying a vast array of cyber security tools. But, instead of relieving their stress, every new tool creates another constant stream of alerts, often wasting the security teams time and increasing their frustration. This Tool Talk will demonstrate the capabilities of the attacker, the five minute process to create zero day malware which eludes known security defenses, and an approach that prioritizes prevention of malware without the need to detect it first.\n
The new online course offered by main ISIS noobs is based on Kali Linux.
The hacking collective known as Anonymous launched its fourth annual #OpIsrael campaign on Thursday to wage cyberattacks against Israel. But Israelis active on Twitter were quick to mock the effort, and make fun of life in their own country.
This fast rising preventative cyber security startup just won its second competition in a week
Rather than just identify and deal with cyber attackers, Israeli Minerva Labs tries to prevent them from entering systems entirely.
An Iranian cyber-attack campaign against targets in the Middle East.
Apple on Monday pushed out an update addressing a critical security issue for OS X concerning a vulnerability discovered in the Network Time Protocol service, affecting Mac users running OS X Yosemite, Mavericks and Mountain Lion.
End-Point Protection, Deception
Discussing the latest headlines of spying against Iran nuclear talks.
Despite modern enterprise security products and procedures, End-Users are still the most targeted. Presenting a few guidelines to prevent user’s takeover.
Short interview with Yosi Mizrahi at 107.5FM on the latest Korea Versus Sony fiasco.
SecurityAffairs - Clearsky detected Gholee malware – The Israel-Gaza Conflict Takes to the Cyber-Arena:
Experts at Clearsky detected the Gholee virus which was likely developed by highly qualified factors, which may even be related to Israel’s long-time nemesis Iran.