Zeus Sphinx: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction When something is described as “rising from the ashes,” the mythological creature known as the phoenix normally comes to mind. For those that research malware, they may soon want to swap ...

How to detect and prevent web shells: New guidance from the NSA and the Australian government

| | Malware Analysis
Introduction It’s not every day that governments of different countries draft guidance rules about any subject together. It is even rarer that they create joint guidance for cybersecurity reasons. It... Go on ...

Tesla Model 3 vulnerability: What you need to know about the web browser bug

| | Malware Analysis
Introduction In 2020, Jacob Archuleta, a researcher nicknamed Nullze, discovered an important information security vulnerability on the web browser of the Tesla Model 3 automobile. If a user of the... Go on ...
Netwalker malware: What it is, how it works and how to prevent it | Malware spotlight

Netwalker malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction Netwalker is a data encryption malware that represents an evolution of the well-known Kokoklock ransomware and has been active since September 2019. This article will detail the specific... Go on to ...

Ramsay malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction The unique functionality of things normally makes them as much of a point of interest as an oddity. Malware is no exception to this notion and a malware framework known as ...

Analysis of ransomware used in recent cyberattacks on health care institutions

| | Malware Analysis
Introduction In recent years, there has been a steady increase in the number of ransomware attacks on healthcare institutions. The pressure such institutions experienced as a result of the COVID-19... Go on ...

PonyFinal malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction to PonyFinal PonyFinal ransomware appeared for the first time in 2020. It is malware that relies on human-operated attacks, i.e., attacks that exploit information security... Go on to the site to ...

Spamdexing (SEO spam malware)

| | Malware Analysis
Introduction: About SEO spam — is my website a target? You’ve spent time and energy in positioning your website high in search engine rankings through good SEO practices. You realize, however, that ...

Agent Tesla: What it is, how it works and why it’s targeting energy companies

| | Malware Analysis
Introduction to Agent Tesla Agent Tesla appeared for the first time in 2014, but it has been just recently used for attacks on energy companies operating in various fields. These fields include ...
Ragnar Locker malware: what it is, how it works and how to prevent it | Malware spotlight

Ragnar Locker malware: what it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction The popularity of ransomware threats does not appear to be decreasing. Instead, more and sophisticated ransomware threats are being deployed. Ragnar Locker is a new data encryption... Go on to the ...