BunnyLoader Malware: Modular Features Help Evade Detection

In the ever-evolving landscape of cybersecurity threats, a new variant of malware has emerged, posing significant challenges for detection and mitigation efforts. Known as BunnyLoader malware, it has recently undergone a transformation, ...

WordPress Sign1 Malware Infects Over 39K Sites In 6 Months

Recent media reports have revealed a malicious malware campaign that has been active for the past six months. Reports claim that the WordPress Sign1 malware has infected and compromised over 39,000 sites ...

Alert: Coyote Trojan Strike Compromises 61 Brazilian Banks

Financial cyberattacks pose a significant threat to the stability of global economies and the security of financial institutions. In a recent cybersecurity development, a staggering 61 banks in Brazil have fallen victim ...

Krasue RAT Malware: A New Threat to Linux Systems

In the field of cybersecurity, a potent and covert threat called Krasue has surfaced. This remote access trojan has been silently infiltrating Linux systems, primarily targeting telecommunications companies since 2021. This blog ...

Beware: WinRAR Vulnerability PoC Exposed

A hacker recently posted a fake proof-of-concept (PoC) exploit for a previously patched WinRAR vulnerability, which is a concerning revelation. The goal of this malevolent operation was to infect unsuspecting downloaders with ...
Ransomware

Ransomware Detection Through Threat Hunting

Ransomware is the most destructive kind of cyber attack due to the massive financial losses it inflicts on organisations worldwide. According to IBM, on average, it takes 280 days to detect any ...

Project STAMINA Uses Deep Learning for Innovative Malware Detection

You’re familiar with the phrase, “A picture is worth 1,000 words.” Well, Microsoft and Intel are applying this philosophy to malware detection—using deep learning and a neural network to turn malware into ...
TLS fingerprinting

TLS Fingerprinting: Rethinking Encrypted Traffic Analysis Strategies

 There seems to be some confusion about the appropriate way to use TLS fingerprinting in an environment. Anytime an SSL library, a library that uses any of those libraries, an OS or ...
Security Boulevard
FireTail digital identity decentralized Entitle API identity credential theft

In the New Fight Against Malware, It’s Spy vs. Spy

Cybersecurity teams are in a tough spot. New, insidious types of malware are emerging all the time (more than 800 million total million malware seen in 2019). In many cases, corporate security ...
Security Boulevard
LinkedIn Jobs, The Malign Effect

LinkedIn Jobs, The Malign Effect

Fake Jobs, leading to malware infections, that is. Microsoft Corporation (Nasdaq: MSFT and it's LinkedIn unit must focus on protecting their product, which of course, are LinkedIn members. Read all about it ...