A Defender’s View of Log4j in Automated Attacks

When Log4j was first exposed to the public, it was only a matter of time before exploits would be developed and fired at any unsuspecting web server with the chance of getting ...
ransom ShinyHunters ransomware

Best of 2021 – Sextortion Email Scams | Avast

| | #popular, Threat Research
Sextortion is an emerging online scam that takes advantage of people’s fear that their most intimate moments will be exposed to the public. They usually come in the form of emails, which ...
How I Hacked Minecraft: A Log4j2 Story

Log4j: Letting the JNDI out of the bottle

If you haven't already seen it, we released a serious security advisory for Java applications using any version of the Log4j2 library less than or equal to version 2.14.1. How would you ...

IronNet security notifications related to Log4j vulnerability

IronNet product/engineering efforts in response to log4j vulnerability:  IronNet is aware of unpatched/vulnerable instances of log4j in our code and that of third-party vendors used within our code. At this time, we ...

CoinHelper Research | Avast

| | Threat Research
Attackers hide malware in cracked, illegal, unauthorized, repackaged copies of software, giving people who are themselves trying to steal software more than they bargained for. This summer, we talked about Crackonosh hiding ...
babadeda crypter

The BABADEDA Crypter – an Emerging Crypter targeting the Crypto, NFT, and DeFi communities

  The cryptocurrency market is now worth more than $2.5 trillion. Unfortunately, this fact is not lost on threat actors. As well as using cryptocurrency themselves to extract ransoms, cybercriminals are now ...
Featured image Emotet is back blog post-1

The Notorious Emotet Is Back: What Organizations Need to Know

Almost a year after an international law enforcement effort supposedly defeated it, Emotet, aka "the world's most dangerous botnet," has returned. Earlier this week, German security researcher Luca Ebach reported seeing malware ...
Malware Analysis Part 3: The phases and roles of incident response

Malware Analysis Part 3: The phases and roles of incident response

In Part 3 of this series, I’m going to cover incident response and the role it plays in malware analysis. If you haven’t had a chance to read the earlier parts of ...
Malware Analysis Part 2: What benefit does it serve?

Malware Analysis Part 2: What benefit does it serve?

In Part 1 of this blog series, we covered a (somewhat) brief introduction to malware analysis. We learned how malware analysis is performed in general and the various types of analysis–triage, dynamic, ...