linkedin post 2019-06-04 04:20:12

Uncategorized
MALWARE ADVANTAGE. “Not only will this emerging development accelerate the time required to breach a system, but the sheer volume that can be applied by a swarm-based botnet targeting multiple devices and exploits simultaneously can quickly overwhelm traditional defense systems.” https://lnkd.in/dBM3R6W View in LinkedIn
Read More

linkedin post 2019-06-02 04:48:18

Uncategorized
EYE MIGRATION. "All adult flatfishes (Pleuronectiformes), including the gastronomically familiar plaice, sole, turbot and halibut, have highly asymmetrical skulls, with both eyes placed on one side of the head. This arrangement, one of the most extraordinary anatomical specializations among vertebrates, arises through migration of one eye during late larval development." https://lnkd.in/dXkc9jF View in LinkedIn
Read More

linkedin post 2019-06-04 04:18:48

Uncategorized
SWARM INTELLIGENCE. “Swarm-based insect colonies such as ants and bees use this process to manage the collection and distribution of resources and workloads. Likewise, artificial swarms can quickly share collected intelligence, accelerate trial and error, and then apply specific attacks to a vulnerability by leveraging those specialized members of the swarm armed with specific exploits.” https://lnkd.in/dBM3R6W View in LinkedIn
Read More

linkedin post 2019-06-04 04:17:10

Uncategorized
SCALABLE SWARMS. “I have written several times about the next step in the evolution of botnets being a scalable architecture based on integrated and autonomous swarm intelligence. Swarm-based attacks can significantly decrease the time needed to breach a system by leveraging things like stigmergy, which is a consensus-based social network mechanism of indirect coordination between agents.” https://lnkd.in/dBM3R6W View in LinkedIn
Read More

linkedin post 2019-06-04 04:15:13

Uncategorized
SWARM AND BLOCKCHAIN MALWARE. “The accelerated development of several precursors of Swarmbots and Hivenets are especially worth revisiting. Others include the increased targeting of critical infrastructure, the development of automation in malware exploits, and the use of blockchain technology to anonymize the command and control of botnets.” https://lnkd.in/dBM3R6W View in LinkedIn
Read More

linkedin post 2019-06-03 05:12:12

Uncategorized
THE HORIZON. “The Evolving Threat Landscape - Swarmbots, Hivenets, Automation in Malware. Over the past several months, the FortiGuard Labs team has been tracking a number of evolving trends related to the FortiGuard 2018 Threat Landscape Predictions article published just before the beginning of the year. This mid-year update provides new details concerning recent advances in some of the techniques and malware tied to those predictions. https://lnkd.in/dBM3R6W View in LinkedIn
Read More

linkedin post 2019-06-03 05:10:31

Uncategorized
SWARM NETWORK. “The information of the prototype's behavior is stored and visualized in the form of a complex network, reflecting virus communication and swarm behavior. The network nodes are then individual virus instances. The network has certain properties associated with its structure that can be used by the virus instances in its activities like locating target and executing payload on the right object.” https://lnkd.in/d5Tah64 View in LinkedIn
Read More

linkedin post 2019-06-03 05:08:10

Uncategorized
PREDATOR AND PREY. “In this article, we outline a possible dynamics, structure, and a behavior of a hypothetical (up to now) swarm malware as a background for a future antimalware system. We suggest how to capture and visualize behavior of such malware when it walks through the file system of an operating system. The swarm virus prototype, designed here, mimics a swarm system behavior and thus follows the main idea underlying the swarm intelligence algorithms. https://lnkd.in/d5Tah64 View in LinkedIn
Read More

linkedin post 2019-06-03 05:06:56

Uncategorized
COMPUTER VIRUS SWARM. “The network nodes are then individual virus instances. The network has certain properties associated with its structure that can be used by the virus instances in its activities like locating target and executing payload on the right object.” https://lnkd.in/d5Tah64 View in LinkedIn
Read More