linkedin post 2019-06-04 04:21:59

Uncategorized
BOTNET SWARMS. “The Hide ‘N Seek IoT botnet, first detected this past spring, has moved the bar significantly closer to enabling a botnet to function as a swarm. It communicates in a complex and decentralized manner using custom-built peer-to-peer communication to implement a variety of malicious routines. It also leverages multiple anti-tampering techniques to prevent a third party from hijacking or poisoning it, and it is also the first IoT botnet malware strain that can survive device reboots and still remain on compromised devices.” https://lnkd.in/dBM3R6W View in LinkedIn
Read More

linkedin post 2019-06-04 04:20:12

Uncategorized
MALWARE ADVANTAGE. “Not only will this emerging development accelerate the time required to breach a system, but the sheer volume that can be applied by a swarm-based botnet targeting multiple devices and exploits simultaneously can quickly overwhelm traditional defense systems.” https://lnkd.in/dBM3R6W View in LinkedIn
Read More

linkedin post 2019-06-02 04:48:18

Uncategorized
EYE MIGRATION. "All adult flatfishes (Pleuronectiformes), including the gastronomically familiar plaice, sole, turbot and halibut, have highly asymmetrical skulls, with both eyes placed on one side of the head. This arrangement, one of the most extraordinary anatomical specializations among vertebrates, arises through migration of one eye during late larval development." https://lnkd.in/dXkc9jF View in LinkedIn
Read More

linkedin post 2019-06-06 04:13:52

Uncategorized
EVOLVING MALWARE. "Soon we will begin to see malware completely created by machines based on automated vulnerability detection and complex data analysis...Polymorphic malware is not new, but it is about to take on a new face by leveraging artificial intelligence to create sophisticated new code that can learn to evade detection through machine written routines." https://lnkd.in/de5H3Um View in LinkedIn
Read More

linkedin post 2019-06-06 04:11:33

Uncategorized
AVOIDING IMMUNE SURVEILLANCE. “In addition, Manky predicts that we'll also see the rise of what he calls next-generation morphic malware, whereby the code of malicious software is automatically altered slightly to evade detection from anti-virus but the same functionality is kept (or some new functionality is gained).” https://lnkd.in/de5H3Um View in LinkedIn
Read More

linkedin post 2019-06-06 04:08:52

Uncategorized
SPREADING INFECTION. “Infected devices will also become smarter, acting on commands without the botnet herder instructing them to do so, he says. As a result, hivenets will be able to grow exponentially as swarms, widening their ability to simultaneously attack multiple victims and significantly impede mitigation and response.” https://lnkd.in/de5H3Um View in LinkedIn
Read More