Operating Systems

Bbd4f9420cc0edec55cb25411422efd2

Updated Dyre, Dropped by Office Macros

May 18, 2015 Added by:Ronnie Tokazowski

We recently analyzed a sample that started out appearing to be Dridex, but quickly turned into a headache leading to Dyre that featured some notable differences to past Dyre samples.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

MacKeeper Patches Serious Remote Code Execution Flaw

May 12, 2015 Added by:Eduard Kovacs

The developers of MacKeeper, the controversial utility software suite for OS X, have patched a critical vulnerability that could have been exploited to remotely execute arbitrary code on affected systems.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Rombertik Strike at MBR Latest in Long Line of Malware Self-Defense Tactics

May 07, 2015 Added by:Brian Prince

The malware, known as Rombertik, is the latest in a long line of examples of malware designed to make the lives of analysts and researchers harder.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

This Carding Forum is Spamtacular

May 05, 2015 Added by:Malwarebytes

Credit card fraud is a huge problem, and by its very nature falls across the entire security spectrum.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Flaws in WordPress eCommerce Plugin Expose Over 5,000 Websites

April 30, 2015 Added by:Eduard Kovacs

Researchers at High-Tech Bridge have identified several vulnerabilities in TheCartPress, an eCommerce plugin installed on more than 5,000 WordPress websites.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

The Four Most Common Evasive Techniques Used by Malware

April 30, 2015 Added by:Tripwire Inc

Malware might be growing in sophistication when it comes to anti-detection measures, but every day, the security community arrives at new measures that use these same evasion tactics against the malicious software they are designed to protect.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Hackers Tricked AT&T, Network Solutions Employees in Tesla Attack

April 28, 2015 Added by:Eduard Kovacs

The official website and Twitter accounts of Tesla Motors were briefly hijacked over the weekend. The electric car manufacturer has provided some details on the attack.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Tech Brief: An Inside View of a Zero-Day Campaign

April 22, 2015 Added by:Malwarebytes

Discovering a new vulnerability in a popular piece of software is the Holy Grail for cybercriminals. The period between this vulnerability being weaponized into an exploit and becoming public knowledge poses a huge security risk to consumers and businesses.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Apple Failed to Properly Fix “Rootpipe” Bug in OS X: Researchers

April 21, 2015 Added by:Eduard Kovacs

Apple’s recent fix for the OS X privilege escalation vulnerability dubbed “rootpipe” isn’t effective, according to researchers.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Law Enforcement, Security Firms Team Up to Disrupt Simda Botnet

April 13, 2015 Added by:Eduard Kovacs

More than a dozen command and control (C&C) servers used by the Simda botnet were seized last week by law enforcement authorities coordinated by Interpol.

Comments  (0)

8eb7be5a13cc39a3e56b78aba08b2039

Long Live the Botnet

April 07, 2015 Added by:Or Katz

You might think that being exposed in a security blog post might bring shame to a bot, and that at the very least it might spend some time underground.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Compromised WordPress Sites Launch Drive-by Attacks Off Pirate Bay Clone

April 01, 2015 Added by:Malwarebytes

WordPress, the leading Content Management System, is one of cyber criminals’ favourite target when it comes to hacking websites.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Air-Gapped Computers Can Communicate Through Heat: Researchers

March 24, 2015 Added by:Eduard Kovacs

Researchers at the Ben Gurion University in Israel have demonstrated that two computers in close proximity to each other can communicate using heat emissions and built-in thermal sensors.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Crouching Yeti APT Actor Still Targeting Industrial Sectors: Kaspersky

March 18, 2015 Added by:Eduard Kovacs

The threat actor group known as Crouching Yeti, Energetic Bear and Dragonfly continues to target organizations across the world. However, experts believe the group has switched targets and infrastructure.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Grabbing Passwords from Memory using Procdump and Mimikatz

March 17, 2015 Added by:Dan Dieterle

When I was working on my Pulling Remote Word Documents from RAM using Kali Linux article, I was curious if you could use the same technique to pull the system passwords, and you can…

Comments  (3)

0ead717779244d9aab5c1699308850d2

Clinton Email Server Vulnerable for 3 Months: Venafi

March 12, 2015 Added by:Brian Prince

Access to the personal email server used by former U.S. Secretary of State Hillary Clinton was not encrypted or authenticated by a digital certificate for the first three months of her term, research from security firm Venafi has found.

Comments  (5)

Page « < 1 - 2 - 3 - 4 - 5 > »