Trojan Infects Browser Extensions After Disabling Integrity Checks

Trojan Infects Browser Extensions After Disabling Integrity Checks

Security researchers have discovered a new Trojan program dubbed Razy that installs itself as a browser extension or infects existing browser extensions after disabling integrity checks. According to researchers from Kaspersky Lab, ...
Security Boulevard
Malvertising Campaign Used Steganography to Distribute Shlayer Trojan

Malvertising Campaign Used Steganography to Distribute Shlayer Trojan

A short-lived malvertising campaign leveraged a steganography-based payload to target Mac users with the Shlayer trojan. Named for its use of veryield-malyst[dot]com as one of its ad-serving domains, the “VeryMal” threat actor ...
What does Cybersecurity have in store for 2019?

What does Cybersecurity have in store for 2019?

A guest article authored by Tom Kellermann, Chief Cybersecurity Officer, Carbon BlackIn every intelligence industry there’s often a central aim: predicting the future. We collect and analyse, dissect and interpret, looking for ...
Malware Using Memes Posted on Twitter as C&C Service

Malware Using Memes Posted on Twitter as C&C Service

Researchers have observed a new threat using malicious memes posted on Twitter to receive command-and-control (C&C) instructions. Trend Micro observed that the malicious activity begins after a threat detected as “TROJAN.MSIL.BERBOMTHUM.AA” executes ...
FontCode: Embedding Information in Text Documents using Glyph Perturbation

Glyph Perturbation, The Science of Font Steganography

via Chang Xiao, Cheng Zhang, Changxi Zheng, all from Columbia University, and presented at the ACM Transaction on Graphics (SIGGRAPH 2018), comes this phenomenal steganographic research; in which, a new methodology to ...

Subverting Backdoored Encryption

This is a really interesting research result. This paper proves that two parties can create a secure communications channel using a communications system with a backdoor. It's a theoretical result, so it ...

Fingerprinting Digital Documents

In this era of electronic leakers, remember that zero-width spaces and homoglyph substitution can fingerprint individual instances of files ...