Winter is coming and ransomware is well underway with a brutal second wave. And while some may call this just…
We sometimes find malware code injections that contain strange code comments, which are normally used by programmers to annotate a…
Introduction The Agent Tesla infostealer has been around since 2014. During the last two to three years, it's also had…
We’ve seen a wider variety of PHP web shells being used by attackers this year — including a number of…
During malware analysis, we regularly find variations of this injected script on various compromised websites: . The variable “_0x446d” assigns…
This summer, MalwareBytes researcher Jérôme Segura wrote an article about how criminals use image files (.ico) to hide JavaScript credit…
The VA Has an Opportunity to Rethink Its Cybersecurity Posture in the New Normal with Cloud Web Isolation. Covid-19 and…
WordPress released version 5.5.2 yesterday, which fixed a reflected XSS vulnerability we reported earlier this year. The root cause of…
The year 2020 will be remembered none too fondly for several reasons. For much of the world, the global pandemic…
Ransomware is a big business today and getting bigger all the time. It is so profitable that organized crime and…