Archive for the ‘Malware’ Category

Nvidia announces official “anti-cryptomining” software drivers

Nvidia, the graphics chip company that wants to buy ARM, made a unusual announcement last week. The company is about to launch its latest GeForce GPU (graphics processing unit) chip, the RTX 3060, and wants its users know that the chip is “tailored to meet the needs of gamers and those who create digital experiences.” Nvidia says: Our […]

Leave a Comment

Experts spotted the first malware tailored for Apple M1 Chip, it is just the beginning

Apple launched its M1 chip and cybercriminals developed a malware sample specifically for it, the latest generation of Macs are their next targets. The popular security researcher Patrick Wardle discovered one of the first malware designed to target latest generation of Apple devices using the company M1 chip. The discovery suggests threat actors are tailoring […]

Leave a Comment

A new Bluetooth overlay skimmer block chip-based transactions

Leave a Comment

The malicious code in SolarWinds attack was the work of 1,000+ developers

Leave a Comment

Analyze suspicious files and URLs to detect types of malware

Leave a Comment

More SolarWinds News

Leave a Comment

Emotet takedown – Europol attacks “world’s most dangerous malware”

Leave a Comment

Fake Amazon gift card emails deliver the Dridex malware

The Dridex malware gang is delivering a nasty gift for the holidays using a spam campaign pretending to be Amazon Gift Cards. Dridex phishing campaign wants to send a gift When distributing malware, malware gangs commonly use current events and the holidays as themes for phishing campaigns to lure people into opening malicious attachments. Such […]

Leave a Comment

Costaricto APT: Cyber mercenaries use previously undocumented malware

CostaRicto APT is targeting South Asian financial institutions and global entertainment companies with an undocumented malware. Blackberry researchers have documented the activity of a hackers-for-hire group, dubbed CostaRicto, that has been spotted using a previously undocumented piece of malware to target South Asian financial institutions and global entertainment companies. “During the past six months, the BlackBerry Research […]

Leave a Comment

Hackers are backdooring QNAP NAS devices with 3-year old RCE bug

Hackers are scanning for vulnerable network-attached storage (NAS) devices running multiple QNAP firmware versions, trying to exploit a remote code execution (RCE) vulnerability addressed by QNAP in a previous release. Source: Hackers are backdooring QNAP NAS devices with 3-year old RCE bug CISA says 62,000 QNAP NAS devices have been infected with the QSnatch malwareQSnatch […]

Leave a Comment

Hacked government, college sites push malware via fake hacking tools

A large scale hacking campaign is targeting governments and university websites to host articles on hacking social network accounts that lead to malware and scams. Some of the sites targeted in this campaign belong to government sites for San Diego, Colorado, Minnesota, as well as sites for UNESCO, the National Institutes of Health (nih.gov), National […]

Leave a Comment

Maersk, me & notPetya – gvnshtn

Maersk is the world’s largest integrated shipping and container logistics company. I was massively privileged (no pun intended) to be their Identity & Access Management (IAM) Subject Matter Expert (SME), and later IAM Service Owner. Along with tens (if not hundreds) of others, I played a role in the recovery and cybersecurity response to the […]

Leave a Comment

Russian cyberspies use Gmail to control updated ComRAT malware

ESET security researchers have discovered a new version of the ComRAT backdoor controlled using the Gmail web interface and used by the state-backed Russian hacker group Turla for harvesting and stealing in attacks against governmental institutions. Source: Russian cyberspies use Gmail to control updated ComRAT malware US, UK, and Holland fighting back against Russia’s cyber attacks Russia cyber attacks: […]

Leave a Comment

Western intelligence hacked Russia’s Google Yandex to spy on accounts

Exclusive: Western intelligence hacked ‘Russia’s Google’ Yandex to spy on accounts – sources Source: Western intelligence hacked ‘Russia’s Google’ Yandex to spy on accounts Enter your email address: Delivered by FeedBurner

Leave a Comment

New Silex malware is bricking IoT devices, has scary plans | ZDNet

Over 2,000 devices have been bricked in the span of a few hours. Attacks still ongoing. Source: New Silex malware is bricking IoT devices, has scary plans | ZDNet How dangerous are IOT devices? | Yuval Elovici | TEDxBGU Enter your email address: Delivered by FeedBurner

Leave a Comment

U.S. Govt Achieves BlueKeep Remote Code Execution, Issues Alert

The Cybersecurity and Infrastructure Security Agency (CISA) published an alert for Windows users to patch the critical severity Remote Desktop Services (RDS) RCE security flaw dubbed BlueKeep. Source: U.S. Govt Achieves BlueKeep Remote Code Execution, Issues Alert   How to check if a target is vulnerable to the new RDP vulnerability (BlueKeep). Enter your email address: Delivered […]

Leave a Comment

A dive into Turla PowerShell usage | WeLiveSecurity

ESET researchers show how, in a bid to evade detection, the Turla group leverages PowerShell scripts to inject malware directly into memory. Source: A dive into Turla PowerShell usage | WeLiveSecurity  Subscribe in a reader

Leave a Comment

Stuxnet Malware Analysis

Stuxnet Malware Analysis By Amr Thabet Stuxnet videos library History of Stuxnet – Previous articles | DISC InfoSec blog What is Stuxnet, who created it and how does it work? | CSO Online GitHub – micrictor/stuxnet: Open-source decompile of Stuxnet/myRTUs Stuxnet Source Code Released Online – Download Now Stuxnet Family Tree Grows  Subscribe in a […]

Leave a Comment

Malware Analysis

Malware Analysis   Malware Analysis: An Introduction – SANS.org   Introduction to Malware Analysis | SANS Lenny Zeltser   Five Awesome Tools to perform Behavioural Analysis of Malware Earlier posts on Malware | DISC InfoSec blog  Subscribe in a reader

Leave a Comment

LimeRAT spreads in the wild

Cybaze-Yoroi ZLab team spotted an interesting infection chain leveraging several techniques able to defeat traditional security defences and spread LimeRAT. Source: LimeRAT spreads in the wild 2019 State of Malware | MalwareByte Labs Enter your email address: Delivered by FeedBurner

Leave a Comment