The Week in Ransomware – May 27 2016 – Zcrypt, Jigsaw, and More
We had 4 new ransomware infections, 2 updates, and one TeslaCrypt news item this week, but for the most part there was nothing that interesting released. When I write theseRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
We had 4 new ransomware infections, 2 updates, and one TeslaCrypt news item this week, but for the most part there was nothing that interesting released. When I write theseRead More →
Researchers say 70,000 servers belonging to others also at risk. Dozens of HTTPS-protected websites belonging to financial services giant Visa are vulnerable to attacks that allow hackers to inject malicious codeRead More →
In this article, we will be looking at the strategies to detect and analyze malware hidden inside an OPcache file. If you haven’t read our previous article about hiding aRead More →
Bank in Philippines was also targeted by attackers, whose malware shares code with tools used by Lazarus group. Symantec has found evidence that a bank in the Philippines has alsoRead More →
A while back I was exploring userland COM and stumbled across some 2011 research by Jon Larimer explaining the dangers of per-user COM objects. Recently Casey Smith (@subtee)started digging intoRead More →
Copy-pasting commands into your terminal allows attackers to append, automatically execute and then hide malicious code. This type of attack is known as clipboard hijacking, and in most scenarios, itRead More →
Little has been published on the threat actors responsible for Operation Ke3chang since the report was released more than two years ago. However, Unit 42 has recently discovered the actorsRead More →
Short Bytes: Symantec’s automated threat analysis system, Norton Safe Web, claims that Linux kernel’s website kernel.org contains 4 threats and shows a red flag to the users. Looking at Norton’sRead More →
Phineas Fisher donates 25 Bitcoin to Syria’s Rojava region.Phineas Fisher, also known as Hack Back, the hacker who breached Hacking Team last summer, revealed on Reddit yesterday that he hackedRead More →
In surprising end to TeslaCrypt, the developers shut down their ransomware and released the master decryption key. Over the past few weeks, an analyst for ESET had noticed that the developers of TeslaCrypt haveRead More →