New Report Uncovers Emotet’s Delivery and Evasion Techniques Used in Recent Attacks

Threat actors associated with the notorious Emotet malware are continually shifting their tactics and command-and-control (C2) infrastructure to escape detection, according to new research from VMware.
Emotet is the work of a threat actor tracked as M… Continue reading New Report Uncovers Emotet’s Delivery and Evasion Techniques Used in Recent Attacks

Posted in Uncategorized

Microsoft Issues Improved Mitigations for Unpatched Exchange Server Vulnerabilities

Microsoft on Friday disclosed it has made more improvements to the mitigation method offered as a means to prevent exploitation attempts against the newly disclosed unpatched security flaws in Exchange Server.
To that end, the tech giant has revised t… Continue reading Microsoft Issues Improved Mitigations for Unpatched Exchange Server Vulnerabilities

Posted in Uncategorized

Hackers Can Use ‘App Mode’ in Chromium Browsers’ for Stealth Phishing Attacks

In what’s a new phishing technique, it has been demonstrated that the Application Mode feature in Chromium-based web browsers can be abused to create “realistic desktop phishing applications.”
Application Mode is designed to offer native-like experien… Continue reading Hackers Can Use ‘App Mode’ in Chromium Browsers’ for Stealth Phishing Attacks

Posted in Uncategorized

BlackByte Ransomware Abuses Vulnerable Windows Driver to Disable Security Solutions

In yet another case of bring your own vulnerable driver (BYOVD) attack, the operators of the BlackByte ransomware are leveraging a flaw in a legitimate Windows driver to bypass security solutions.
“The evasion technique supports disabling a whopping l… Continue reading BlackByte Ransomware Abuses Vulnerable Windows Driver to Disable Security Solutions

Posted in Uncategorized