Malware Detection
BunnyLoader Malware: Modular Features Help Evade Detection
In the ever-evolving landscape of cybersecurity threats, a new variant of malware has emerged, posing significant challenges for detection and mitigation efforts. Known as BunnyLoader malware, it has recently undergone a transformation, ...
WordPress Sign1 Malware Infects Over 39K Sites In 6 Months
Recent media reports have revealed a malicious malware campaign that has been active for the past six months. Reports claim that the WordPress Sign1 malware has infected and compromised over 39,000 sites ...
Alert: Coyote Trojan Strike Compromises 61 Brazilian Banks
Financial cyberattacks pose a significant threat to the stability of global economies and the security of financial institutions. In a recent cybersecurity development, a staggering 61 banks in Brazil have fallen victim ...
Krasue RAT Malware: A New Threat to Linux Systems
In the field of cybersecurity, a potent and covert threat called Krasue has surfaced. This remote access trojan has been silently infiltrating Linux systems, primarily targeting telecommunications companies since 2021. This blog ...
Beware: WinRAR Vulnerability PoC Exposed
A hacker recently posted a fake proof-of-concept (PoC) exploit for a previously patched WinRAR vulnerability, which is a concerning revelation. The goal of this malevolent operation was to infect unsuspecting downloaders with ...
Ransomware Detection Through Threat Hunting
Ransomware is the most destructive kind of cyber attack due to the massive financial losses it inflicts on organisations worldwide. According to IBM, on average, it takes 280 days to detect any ...
Project STAMINA Uses Deep Learning for Innovative Malware Detection
You’re familiar with the phrase, “A picture is worth 1,000 words.” Well, Microsoft and Intel are applying this philosophy to malware detection—using deep learning and a neural network to turn malware into ...
TLS Fingerprinting: Rethinking Encrypted Traffic Analysis Strategies
There seems to be some confusion about the appropriate way to use TLS fingerprinting in an environment. Anytime an SSL library, a library that uses any of those libraries, an OS or ...
In the New Fight Against Malware, It’s Spy vs. Spy
Cybersecurity teams are in a tough spot. New, insidious types of malware are emerging all the time (more than 800 million total million malware seen in 2019). In many cases, corporate security ...
LinkedIn Jobs, The Malign Effect
Fake Jobs, leading to malware infections, that is. Microsoft Corporation (Nasdaq: MSFT and it's LinkedIn unit must focus on protecting their product, which of course, are LinkedIn members. Read all about it ...