Search results: malware

Malware Analysis Part 1: How does it work?

Malware Analysis Part 1: How does it work?

| | Infosec Blog, security
Malware analysis is one of my favorite subjects. It's as broad as it is deep because there is no end to the amount of bad stuff available on the internet. Today, let’s ...
Introduction to Malware Triage

Malware Triage: Dissecting Threats to Your Security

Malware analysis is an incredibly broad topic. Because of the near-limitless number of operating systems, system architectures, scripting languages, and services out there, the potential for delivering malware and defining its behavior ...
Addressing the TLS/SSL encryption blind spot

Encrypted Traffic Inspection Lags as Malware Rises

| | Cyber Security
Ransomware, malware, and other forms of cyber-attacks continue to rise. Ransomware alone increased by 151 percent globally in the first half of 2021; according to the FBI, there are now 100 different ...
THREAT ANALYSIS REPORT: Snake Infostealer Malware

THREAT ANALYSIS REPORT: Snake Infostealer Malware

The Cybereason Global Security Operations Center (GSOC) issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them ...

CIS Control 10: Malware Defenses

| | Security Controls
With the continuing rise of ransomware, malware defenses are more critical than ever before with regard to securing the enterprise. Anti-Malware technologies have become an afterthought in many organizations, a technology that ...

Newly Found npm Malware Mines Cryptocurrency on Windows, Linux, macOS Devices

Sonatype’s automated malware detection system has caught multiple malicious packages on the npm registry this month. These packages disguise themselves as legitimate JavaScript libraries but were caught launching cryptominers on Windows, macOS ...

How Malware Was Used to Create Fake Expired Certificate Alerts

|
The post How Malware Was Used to Create Fake Expired Certificate Alerts appeared first on Keyfactor ...

Learning Framework For Detection of Novel Malware | Avast

| | Artificial Intelligence
This post was written by the following Avast researchers: Viliam Lisý, Avast Principal AI ScientistBranislav Bošanský, Avast Principal AI ScientistKarel Horak, Avast Senior AI ResearcherMatej Racinsky, Avast AI ResearcherPetr Somol, Avast Director ...

MyKings Crypto Malware | Avast

| | Threat Research
There’s a lot of money in cryptocurrency these days. In addition to hobby traders, cryptocurrency has attracted the attention of legitimate investors and speculators. It’s also attracted the attention of cyber criminals, ...
shutterstock_642315214

When it Comes to Malware Think Like Bond “Trust No One”

If you’ve ever watched a Bond movie you know that James Bond has a trust complex. Whether it’s M, MI6, or a femme fatale – Bond always gets into trouble when he ...

Secure Guardrails