Homepage
Open in app
Sign in
Get started
KNOWLEDGE
CAREERS
HISTORY OF...
DEEP DIVES
ARCHIVE
SYMANTEC BLOG
Deep Dives
Attacks from Malicious IP Hit Multiple Machines in Several Countries
Attacks from Malicious IP Hit Multiple Machines in Several Countries
Persistent attempted attacks from a typical cyber crime actor were consistently thwarted by Symantec techonologies.
Threat Intel
May 27, 2020
Emotet: Dangerous Malware Keeps on Evolving
Emotet: Dangerous Malware Keeps on Evolving
Research by Symantec’s Threat Engineering Team reveals details about which compression algorithm Emotet has customized to use in its code.
Threat Intel
Mar 30, 2020
LNK: A perfect vector for living-off-the-land attacks
LNK: A perfect vector for living-off-the-land attacks
An ideal tool for living-off-the-land criminals’ arsenals.
Threat Intel
Sep 2, 2019
Cryptojacking Criminals Are Using Multiple Techniques to Install Coinminers
Cryptojacking Criminals Are Using Multiple Techniques to Install Coinminers
Symantec has been tracking several cryptojacking campaigns that use bugs and exposed API ports to compromise computers.
Karthikeyan Kasiviswanathan
Nov 14, 2018
Accelerate your machine learning: introducing mlpack 3.0
Accelerate your machine learning: introducing mlpack 3.0
Senior principal research engineer Ryan Curtin explains the advantages of mlpack 3.0.
Threat Intel
Jul 18, 2018
Alexa, open the pod bay doors: Being friends with a voice-activated smart speaker
Alexa, open the pod bay doors: Being friends with a voice-activated smart speaker
A closer look at the risks of owning a Google Home or Amazon’s Echo Dot.
candid wueest
Nov 21, 2017
Why security software misfires, and 6 things software authors can do about it
Why security software misfires, and 6 things software authors can do about it
6 things software authors can do to make sure their work isn’t mistaken for malware.
Julie Matviyuk
Nov 1, 2017
Petya outbreak: What’s the motive behind this major cyber attack?
Petya outbreak: What’s the motive behind this major cyber attack?
Money or disruption? Which is the more likely motivation of the people behind the Petya cyber attack?
Gavin O'Gorman
Jun 28, 2017
Operation Bachosens: A detailed look into a long-running cyber crime campaign
Operation Bachosens: A detailed look into a long-running cyber crime campaign
An insight into an investigation into a unique attack on an automotive parts supplier in China that ended with unexpected results.
Jon DiMaggio
May 31, 2017
Can files locked by WannaCry be decrypted: A technical analysis
Can files locked by WannaCry be decrypted: A technical analysis
Symantec researchers examine if it is possible to decrypt files locked by the WannaCry ransomware.
Threat Intel
May 15, 2017
About Threat Intel
Latest Stories
Archive
About Medium
Terms
Privacy
Teams