Astaroth’s New Evasion Tactics Make It ‘Painful to Analyze’
The infostealer has gone above and beyond in its new anti-analysis and obfuscation tactics. Continue reading Astaroth’s New Evasion Tactics Make It ‘Painful to Analyze’
Collaborate Disseminate
The infostealer has gone above and beyond in its new anti-analysis and obfuscation tactics. Continue reading Astaroth’s New Evasion Tactics Make It ‘Painful to Analyze’
Microsoft’s security experts have warned on Monday about several email malware delivery campaigns exploiting the COVID-19 pandemic targeting companies in the US and South Korea. What they have in common is the ultimate delivery of the Remcos RAT … Continue reading Can you trust attachments with unfamiliar extensions?
The Kwampirs (aka Orangeworm) attack group continues to target global healthcare entities in this time of crisis, the FBI has warned. “Targeted entities range from major transnational healthcare companies to local hospital organizations,” t… Continue reading Kwampirs threat actor continues to breach transnational healthcare orgs
Evasive malware has grown to record high levels, with over two-thirds of malware detected by WatchGuard in Q4 2019 evading signature-based antivirus solutions. This is a dramatic increase from the year-long average of 35% for 2019 and points to the fac… Continue reading Evasive malware increasing, evading signature-based antivirus solutions
Cybercriminals are busy innovators, adapting their weapons and attack strategies, and ruthlessly roaming the web in search of their next big score.
Every manner of sensitive information, such as confidential employee records, customers’ financial data… Continue reading 14 Ways to Evade Botnet Malware Attacks On Your Computers
Amid significant increases in both malware and network attacks, multiple Apache Struts vulnerabilities – including one used in the devastating Equifax data breach – appeared for the first time on WatchGuard’s list of most popular network attacks in Q3 … Continue reading As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections
The Council to Secure the Digital Economy (CSDE), a partnership between global technology, communications, and internet companies supported by USTelecom—The Broadband Association and the Consumer Technology Association (CTA), released the International… Continue reading Free download: Botnet and IoT Security Guide 2020
An open source tool that allows users to track and record the behavior of JavaScript programs without alerting the websites that run those programs has been developed at North Carolina State University. The tool, called VisibleV8, runs in the Chrome br… Continue reading VisibleV8: Stealthy open source tool for monitoring JavaScript in the wild
Cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as anti-analysis techniques as they become more sophisticated in their attempts, according to Fortinet. Upping the ant… Continue reading Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises
There seems to be some confusion about the appropriate way to use TLS fingerprinting in an environment. Anytime an SSL library, a library that uses any of those libraries, an OS or the application itself is updated or changed, there’s a good possibil… Continue reading TLS Fingerprinting: Rethinking Encrypted Traffic Analysis Strategies