Malware

Obfuscation Techniques in MARIJUANA Shell “Bypass”

Attackers are always trying to come up with new ways to evade detection from the wide range of security controls…

2 days ago

The Targeting of the COVID-19 Vaccine Supply Chain

The world has waited for 10 months for the good news that arrived this week—the first inoculations of the COVID-19…

2 days ago

How to Protect Your Business From Multi-Platform Malware Systems

The Lazarus Group (also known as Guardians of Peace or Whois) is a notorious cybercrime gang made up of unknown…

3 days ago

“Free” Symchanger Malware Tricks Users Into Installing Backdoor

In a previous post, I discussed how attackers can trick website owners into installing malware onto a website — granting…

4 days ago

How to Spot Razy Malware Undetected By AV Systems

Examining traffic patterns can help spot malware such as Razy on users' systems Note: Periodically, security researchers on the Cato…

5 days ago

Old Vulnerabilities Open the Door for WannaCry Ransomware

More than three years since it was discovered, WannaCry is still a threat for some organizations, research has found How…

5 days ago

CISA’s recommendations to recognize and avoid email scams [E-book]

Email has always been a popular tool for business communications. Unfortunately, it is also one of the weakest links in…

6 days ago

Pay2Key Ransomware Joins the Threat Landscape

As we approach the end of a year that has been trying for so many reasons, yet another ransomware has…

6 days ago

Hackers Love Expired Domains

Sometimes, website owners no longer want to own a domain name and they allow it to expire without attempting to…

1 week ago

Hidden SEO Spam Link Injections on WordPress Sites

Often when a website is injected with SEO spam, the owner is completely unaware of the issue until they begin…

2 weeks ago