Cybereason vs. RansomEXX Ransomware
Research by: Daniel Frank
The post Cybereason vs. RansomEXX Ransomware appeared first on Security Boulevard.
Continue reading Cybereason vs. RansomEXX Ransomware
Collaborate Disseminate
Research by: Daniel Frank
The post Cybereason vs. RansomEXX Ransomware appeared first on Security Boulevard.
Continue reading Cybereason vs. RansomEXX Ransomware
Security researchers observed a politically motivated APT called “Molerats” using three new malware variants to conduct espionage in the Middle East.
The post Molerats APT: New Malware and Techniques in Middle East Espionage Campaign appeared firs… Continue reading Molerats APT: New Malware and Techniques in Middle East Espionage Campaign
By now, you’ve probably heard: On December 13, Reuters reported that malicious actors had gone after both the U.S. Department of Treasury and the U.S. Department of Commerce. The National Security Council met at the White House on December 12 to t… Continue reading The SolarWinds Supply Chain Attack and the Limits of Cyber Hygiene
Ryuk ransomware has been infecting victims since around 2018, and is believed to be based on the source code of Hermes ransomware, which was sold on an internet hacking forum back in 2017. Since its inception, Ryuk has been used to target large or… Continue reading Cybereason vs. Ryuk Ransomware
This week, headlines blew up with warnings of a design flaw in the CTF subsystem (msctf) of the Windows Text Services Framework that affects all current Windows systems and those going back as far as twenty years.
The post Morphisec vs. the Micros… Continue reading Morphisec vs. the Microsoft CTF Exploit: Twenty Year Old Design Flaw No Match for Morphisec
Last week, a new strain of ransomware hit dozens of targets across Germany. The categorization as ransomware is really a misnomer as, while the attackers do demand a ransom, by that time the victim’s data has already been irreversibly wiped,… Continue reading Threat Alert: GermanWiper
During the period of March to May 2019, Morphisec Labs observed a new, highly sophisticated variant of the ShellTea / PunchBuggy backdoor malware that attempted to infiltrate a number of machines within the network of a customer in the hotel-enter… Continue reading Security Alert: FIN8 is Back in Business, Targeting the Hospitality Industry