Security Alerts & News
by Tymoteusz A. Góral

History
#1572 Surge of email attacks using malicious WSF attachments
Symantec has seen a major increase in the number of email-based attacks using malicious Windows Script File (WSF) attachments over the past three months. Ransomware groups in particular have been employing this new tactic. In the past two weeks, Symantec has blocked a number of major campaigns distributing Locky (Ransom.Locky) which involved malicious WSF files.

WSF files are designed to allow a mix of scripting languages within a single file. They are opened and run by the Windows Script Host (WSH). Files with the .wsf extension are not automatically blocked by some email clients and can be launched like an executable file.
Read more
#1576 CryPy: ransomware behind Israeli lines
#1575 Most businesses haven't inspected cloud services for malware
#1574 CSP Evaluator
#1573 AVTECH shuns security firm and leaves all products vulnerable without a patch
#1572 Surge of email attacks using malicious WSF attachments
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12