Endpoint security solutions challenged by zero-day and fileless attacks

There is an endpoint protection gap against modern threats, the result of a recent survey by the Ponemon Institute and Barkly have shown. The organizations polled 660 IT and security professionals to get insight on the state of endpoint security risk, … Continue reading Endpoint security solutions challenged by zero-day and fileless attacks

GrrCon Augusta 2018, Adam Hogan’s ‘Malware Mitigation Sample Detonation Intelligence Automation: Make Your Binaries Work for You’

Videography Credit: Irongeek (Adrian Crenshaw).
Permalink
The post GrrCon Augusta 2018, Adam Hogan’s ‘Malware Mitigation Sample Detonation Intelligence Automation: Make Your Binaries Work for You’ appeared first on Security Boulevard.
Continue reading GrrCon Augusta 2018, Adam Hogan’s ‘Malware Mitigation Sample Detonation Intelligence Automation: Make Your Binaries Work for You’

Underground vendors can reliably obtain code signing certificates from CAs

More and more malware authors are switching to buying new, valid code signing certificates issued by Certificate Authorities instead of using stolen (compromised) ones, researchers have found. They do not go directly to the CAs for that, but go through… Continue reading Underground vendors can reliably obtain code signing certificates from CAs

Fooling security tools into believing malicious code was signed by Apple

The way developers of third-party security tools use the Apple code signing API could be exploited by attackers to make malicious code linger undetected on Macs, a security researcher has discovered. “Security, incident response, and forensics pr… Continue reading Fooling security tools into believing malicious code was signed by Apple

Yes, Virgina, Malicious Advertising Growth in Numbers and Viciousness Is Startling

Dan Goodin, writing at our beloved Ars Technica, reports on the startling large numbers of malicious advertising exploits and the subsequent malevolence of same. Unfortunately, Today’s Must Read.
Permalink
The post Yes, Virgina, Malicious Advertising … Continue reading Yes, Virgina, Malicious Advertising Growth in Numbers and Viciousness Is Startling

Data Forensics: A New Frontier in Malware Prevention and Detection

Companies devote around 90 percent of their cybersecurity resources to prevention and detection. Through regular patching and other basic prevention measures, network and security teams are keeping the world’s malware at bay and detecting ransomware be… Continue reading Data Forensics: A New Frontier in Malware Prevention and Detection

Process Doppelgänging: New Malware Evasion Technique Works On All Windows Versions

A team of security researchers has discovered a new malware evasion technique that could help malware authors defeat most of the modern antivirus solutions and forensic tools.

Dubbed Process Doppelgänging, the new fileless code injection technique tak… Continue reading Process Doppelgänging: New Malware Evasion Technique Works On All Windows Versions

Google Play Protect scans for malicious apps

By now, many Android users that have the Google Play Store app on their devices should be able to find Google Play Protect in it. What is Google Play Protect? Google Play Protect is a security suite for Android devices, which brings together some old and some new features aimed at protecting users’ devices against harmful or malicious apps. The security suite: Scans and verifies apps users want to download from Google Play (before they … More Continue reading Google Play Protect scans for malicious apps

maltrail – Malicious Traffic Detection System

Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail ca… Continue reading maltrail – Malicious Traffic Detection System