Okta

Okta Enables Entire Organization to Participate in Cybersecurity Defense

At its Okta Showcase event, Okta launched Okta SecurityInsights to expand the base of individuals who can act on cybersecurity threats as they emerge. Joe Diamond, senior director of product marketing for ...
Security Boulevard
Threat Announcement: Phishing Sites Detected on Emoji Domains

Threat Announcement: Phishing Sites Detected on Emoji Domains

| | Phish, Threat analysis
Since September 21, PhishLabs analysts have detected a number of phishing sites hosted on emoji domains. So far, all detected sites have a few things in common: ...
Reversing malware in a custom format: Hidden Bee elements

Reversing malware in a custom format: Hidden Bee elements

When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing the malware, we discovered that its authors actually created their own executable ...

Fileless malware: getting the lowdown on this insidious threat

In this series of articles, we provide an in-depth discussion of fileless malware and their related attacks. In part one, we cover a brief overview of the problems with and general features ...
enSilo Webinar Recording Process Doppelganging December2017

Process Doppelgänging meets Process Hollowing in Osiris dropper

Process doppleganging, a rare technique of impersonating a process, was discovered last year, but hasn't been seen much in the wild since. It was an interesting surprise, then, to discover its use ...
Exploit kits: summer 2018 review

Exploit kits: summer 2018 review

Just like the beach, the EK landscape got a little crowded this summer. Find out what we discovered in our exploit kits summer review. Categories: Exploits Threat analysis Tags: drive-by downloadsdrive-bysEKEKsexploit kitsgrandsoftGreenFlash ...
‘Hidden Bee’ miner delivered via improved drive-by download toolkit

‘Hidden Bee’ miner delivered via improved drive-by download toolkit

Threat actors switch to the Hidden Bee miner as a payload for this unusual and complex drive-by download campaign. Categories: Exploits Threat analysis Tags: bootkitcryptominerdrive-by attackexploithidden beehidden bee minerMBR (Read more...) The ...
New strain of Mac malware Proton found after two years

New strain of Mac malware Proton found after two years

A new variant of the Mac malware Proton, which was rampant on macOS last year, has been found dating back to at least two years ago. Learn how this could still affect ...

Decision Analysis Applications in Threat Analysis Frameworks

Cybersecurity is generally considered to be a highly reactive field where professionals struggle to keep up with new and emerging threats. As the profession works to become more human-centered and proactive, I ...
Magniber ransomware improves, expands within Asia

Magniber ransomware improves, expands within Asia

After a controlled delivery focused on South Korea, an upgraded Magniber ransomware is now affecting other Asian countries. Categories: Exploits Threat analysis Tags: asiaEKmagniberMagnigateMagnitudeMalaysiaSouth KoreaTaiwan (Read more...) The post Magniber ransomware improves, ...