We recently completed the “New Engine Claiming and Management” milestone on our development roadmap. Our goal was to make it easier for Engine owners to build, configure and test an engine, and then join the PolySwarm Marketplace, so we’ve completely redesigned the architecture.
PolySwarm’s threat research team has discovered new, previously unpublished versions of the EventBot malware family.
We may not be able to connect in person right now, but we can still meet up...digitally of course! PolySwarm CTO Paul Makowski will be the featured guest of Pacific Hackers Meetup on Saturday, April 18, 2 p.m. PT - 4 p.m. PT. We're talking research-driven threat intel; the latest in malware detection techniques; PolySwarm's growing malware research community, polyX, and how you can get in on tha action; COVID-19 malware trends and more. So grab your computer, a beverage and spice up your Saturday with an interactive security discussion.
To put it simply, there are some really cool threat detection technologies on the PolySwarm marketplace. As a recap, here at PolySwarm, we aggregate research-driven threat detection engines---both from AV companies and individual, specialized security experts---that compete in real-time to detect threats. Enterprises and individuals using PolySwarm benefit from deeper coverage of the malware landscape and unique threat intelligence from this aggregated network of engines.
The Telegram messaging app is used by over 200 million people around the world and has proven to be a great communication vehicle for individuals and companies. Unfortunately, Telegram is also an attractive target for bad actors looking to exploit the platform and people. From cryptocurrency stealers and miners, Telegram has seen its fair share of scams.
The world is experiencing a trying time, and every sector is impacted in some way by the COVID-19 pandemic. The unfortunate reality is that in times of crisis, hackers exploit vulnerabilities in systems...and humans: the COVID-19 pandemic is no exception. Over the last two weeks, here at PolySwarm, our malware analysts have seen a severe increase in pandemic related cyber threats--from Android ransomware to malware-laden “coronavirus map trackers”--that prey on people’s fragility and trust.
Today, PolySwarm, a threat intelligence platform used to detect new and emerging malware, releases information about a new variant of ZeroCleare (a destructive malware attributed to Iran). PolySwarm Community (free) and Enterprise users were able access to the full content of this sample before it appeared on VirusTotal.
Cybercriminals behind Emotet, one of the most prolific botnets in recent history, have ramped up a new Christmas-themed phishing attack. It lures victims to download malicious attachments related to "menus" for an upcoming Christmas party.