40,000 CryptBot Downloads per Day: Bitbucket Abused as Malware Slinger
Public source code repository at Bitbucket.org was as abused to host CryptBot, Buer loader with NuclearBot and Cryptominer.
40,000 CryptBot Downloads per Day: Bitbucket Abused as Malware Slinger
Public source code repository at Bitbucket.org was as abused to host CryptBot, Buer loader with NuclearBot and Cryptominer.
The story of my life : How I got into the security industry 30 years ago!
People and media are mostly looking at ransomware as a fairly recent problem. That seems to be logical if you see the rise of ransomware the past years. In fact, the problem is much older than most of us think. For this we need to go back in time to the beginning of December 1989. For some this is…
Germans dispense with security for their smartphones on holiday
G DATA survey shows that Germans are not so strict about IT security when on holiday. 43 per cent take no action regarding security for their mobile device before going away. This means no installation of security software and no password request activation. This makes life easy for local digital…
G DATA IT Security Trends 2020: Early detection and repulsion of dangerous attacks
Medium-sized companies are being targeted even more heavily by cyber criminals than before. They are often the weakest link in supply chains that include large corporations. In 2020, attackers will exploit this to an even greater extent than before and strike in a targeted manner - using new methods…
Staying one step ahead - why new technologies are needed to expose cyber attacks
It still takes an average of six months for cyber-attacks on companies to be detected. A major reason for this is the sophisticated methods used by attackers to infiltrate their targets. In this series of blogs, read why new cyber defence technologies are needed (Part 1), how graph databases are…
Shadow IT: What do NASA and medium-sized companies have in common?
Incredible, but true - an intrusion into a NASA internal network went unnoticed for almost a year. One of the reasons for this was a minicomputer that was connected to the network without the knowledge of the IT department. The events cast a bad light on JPL's security practices.
Learning from the best: Attending AllStars 2019
This year's AllStars took place in Amsterdam in September, alongside the two-day Global AppSec conference. The event offers a full day of the best hand-picked lectures from top speakers and researchers in the field of information security. G DATA virus analyst Karsten Hahn was there and presented…
Emotet: How an Emotet infection occurs in companies
The Emotet malware is still considered one of the most dangerous threats to corporate IT worldwide. Analysts at G DATA Advanced Analytics have tracked down how an Emotet infection starts gradually infiltrating corporate networks and then takes them out of operation bit by bit.
Interview with Carl-Benedikt Bender “Machine learning in general is very complex and has a lot of surprises in store”
With its DeepRay AI technology, G DATA is leading the way against rapidly changing malware. Carl-Benedikt Bender, leader of the development team behind DeepRay, explains how the technology works and what specific challenges arose during development.
Virus Bulletin Conference 2019: The Place-to-be
The annual Virus Bulletin conference (called „VB“ for short) is one oft he most important events of the year when it comes to threat intelligence for researchers and analysts as well as product managers and CISOs from all over the world. As usual, G DATA sent several members of their team. When they…