DIY: Hunting Azure Shadow Admins Like Never Before

DIY: Hunting Azure Shadow Admins Like Never Before

TL;DR Cloud technologies are ubiquitous and most organizations rely on cloud vendors to provide them with critical services and computing workloads. This ecosystem makes organizations deeply dependent on their cloud infrastructure with ...

Why Emotet Remains An Active Threat | Avast

| | Threat Research
One of the longest-running and more lethal malware strains has once again returned on the scene. Called Emotet, it started out life as a simple banking Trojan when it was created back ...
Shad Claw

DIY: Hunting Azure Shadow Admins Like Never Before

TL;DR Cloud technologies are ubiquitous and most organizations rely on cloud vendors to provide them with critical services and computing workloads. This ecosystem makes organizations deeply dependent on their cloud infrastructure with ...
Social Engineering

What Twitter Attack Says on Human Nature, Social Engineering

Last week, Twitter suffered a breach that led to the compromise of numerous high-profile accounts, including those of Barak Obama, Joe Biden, Jeff Bezos and Elon Musk. I took the opportunity to ...
Masking Malicious Memory Artifacts – Part II: Insights from Moneta

Masking Malicious Memory Artifacts – Part II: Insights from Moneta

Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and detection is becoming an increasingly valuable skill to add to both ...
Masking Malicious Memory Artifacts – Part I: Phantom DLL Hollowing

Masking Malicious Memory Artifacts – Part I: Phantom DLL Hollowing

Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and detection is becoming an increasingly valuable skill to add to both ...
Cyber Attacks in the Pandemic Era: More of the Same  

Cyber Attacks in the Pandemic Era: More of the Same  

Since COVID-19 began to spread rapidly across the globe, we’ve seen near-constant headlines of cyber attacks hitting organizations in the midst of chaos. An elite group of cyber criminals launched a sophisticated ...

Avast Finds Banking Trojan, Cerberus, on Google Play | Avast

| | Threat Research
In the last few days, our Mobile Threat Labs team at Avast discovered a Cerberus banking Trojan on Google Play that was targeting Android users in Spain. As is common with banking ...
Avast Discovers 47 Android Adware Apps | Avast

Avast Discovers 47 Android Adware Apps | Avast

| | Threat Research
Avast researchers have discovered a large campaign of HiddenAds on the Google Play Store. HiddenAds refers to a family of Trojans that disguise as safe and useful applications, but in fact only ...
Scammers using SEO to lure victims | Avast

Scammers using SEO to lure victims | Avast

| | Threat Research
Google, Bing, Yahoo, Yandex, and Baidu are some of the world’s top search engines and serve as the starting point for millions of internet users seeking information. Most people probably don’t browse ...