You searched for malware - Security Boulevard

Search results: malware

Microscope - tardigrade

Sophisticated Tardigrade malware launches attacks on vaccine manufacturing infrastructure

Security researchers are warning biomanufacturing facilities around the world that they are being targeted by a sophisticated new strain of malware, known as Tardigrade. The warning comes from the non-profit Bioeconomy Information ...

Tracking the ‘Noblox.js’ npm Malware Campaign

A new malicious package, noblox.js-rpc was spotted on the npm registry this month that leverages the same techniques we saw before to steal all sorts of sensitive data like credentials, files, and ...
Malware Analysis Part 3: The phases and roles of incident response

Malware Analysis Part 3: The phases and roles of incident response

In Part 3 of this series, I’m going to cover incident response and the role it plays in malware analysis. If you haven’t had a chance to read the earlier parts of ...

Understanding .htaccess Malware

The .htaccess file is notorious for being targeted by attackers. Whether it’s using the file to hide malware, redirect search engines to other sites with blackhat SEO tactics, hide backdoors, inject content, ...

NPM Hijackers at it Again: Popular ‘coa’ and ‘rc’ Open Source Libraries Taken Over to Spread Malware

Just last week we saw the popular npm package `ua-parser-js` get hijacked. Malicious actors gained access to the project maintainer’s npm account and published malicious versions that attempted to install a cryptominer ...

Benefits of a Website Malware Scanner

Malicious code/ software can wreak havoc for the business, from account takeover and database tampering to stealing data and causing other forms of cyberattacks. A website malware scanner enables organizations to proactively address the challenge. The post ...
Malware Analysis Part 2: What benefit does it serve?

Malware Analysis Part 2: What benefit does it serve?

In Part 1 of this blog series, we covered a (somewhat) brief introduction to malware analysis. We learned how malware analysis is performed in general and the various types of analysis–triage, dynamic, ...
Deep Dive into a Fresh Variant of Snake Keylogger Malware

Deep Dive into a Fresh Variant of Snake Keylogger Malware

|
FortiGuard Labs recently discovered a fresh variant of the Snake Keylogger malware. Learn how it is downloaded and executed through a captured Excel sample, what techniques this variant uses to protect it ...
Deep Dive into a Fresh Variant of Snake Keylogger Malware

Deep Dive into a Fresh Variant of Snake Keylogger Malware

|
FortiGuard Labs recently discovered a fresh variant of the Snake Keylogger malware. Learn how it is downloaded and executed through a captured Excel sample, what techniques this variant uses to protect it ...
Types of Malware: How to Detect and Prevent Them

Types of Malware: How to Detect and Prevent Them

Malware attacks are costly and destructive. Learn about the different types of malware, how they work and how to protect your data from these threats ...

Posts

Categories

Month

:)