Search Results for: malware Blog Post MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of... Blog Post Russian Malware Disrupted Ukrainian Organizations Before Invasion March 2, 2022 Based on an alert posted by CISA on February 26, Russian-backed threat actors targeted a host of significant Ukrainian organizations, aiming to... Blog Post Newly Found Malware Threatens IoT Devices January 12, 2022 A new malware has been identified by AT&T Alien Labs that exposed millions of Internet of Things devices. The BotenaGo... Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently... Knowledge Center DearCry Ransomware Malware Analysis and Reverse Engineering April 8, 2021 The goal of this paper is to provide a deep analysis of DearCry ransomware and demonstrate some techniques of malware... Blog Post Malware for macOS managed to infect 40,000 of computers March 8, 2021 Cybersecurity research uncovered a new malware for macOS, which managed to infect almost 40,000 computers over the past couple of... Blog Post HolesWarm (Crypto-Miner) Malware Targeted Unpatched Windows and Linux Servers September 16, 2021 Researchers at a security firm named Tencent have recently revealed details about the botnet crypto-miner. For the record, the crypto-miner... Blog Post A Rust-based Buer Malware Variant Has Been Spotted in the Wild May 17, 2021 This month has begun with shocking news since cybersecurity researchers have revealed a new malspam campaign. It discovered that the... Blog Post Apple’s Craig Federighi Thinks DMA Will Open A “Pandora’s Box of Malware January 7, 2022 During this year’s Web Summit, a technology conference that is held annually in Lisbon, Portugal, Apple’s Craig Federighi, the Senior... Blog Post Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple... Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected... Blog Post Unsophisticated Nigerian Threat Actor Threatening to Ground the Airline Industry Through Commodity Malware October 7, 2021 For the past five years, a suspected unsophisticated threat actor has been wreaking havoc on the airline and other industries... Knowledge Center Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is... Blog Post SysJoker – A New Multi-Platform Backdoor Malware Targeting Microsoft, Mac, and Linux Systems January 26, 2022 A new, multi-platform backdoor malware was discovered in December 2021, targeting Windows, Linux, and Mac systems. The backdoor has been... Blog Post The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash...
Blog Post MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of...
Blog Post Russian Malware Disrupted Ukrainian Organizations Before Invasion March 2, 2022 Based on an alert posted by CISA on February 26, Russian-backed threat actors targeted a host of significant Ukrainian organizations, aiming to...
Blog Post Newly Found Malware Threatens IoT Devices January 12, 2022 A new malware has been identified by AT&T Alien Labs that exposed millions of Internet of Things devices. The BotenaGo...
Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently...
Knowledge Center DearCry Ransomware Malware Analysis and Reverse Engineering April 8, 2021 The goal of this paper is to provide a deep analysis of DearCry ransomware and demonstrate some techniques of malware...
Blog Post Malware for macOS managed to infect 40,000 of computers March 8, 2021 Cybersecurity research uncovered a new malware for macOS, which managed to infect almost 40,000 computers over the past couple of...
Blog Post HolesWarm (Crypto-Miner) Malware Targeted Unpatched Windows and Linux Servers September 16, 2021 Researchers at a security firm named Tencent have recently revealed details about the botnet crypto-miner. For the record, the crypto-miner...
Blog Post A Rust-based Buer Malware Variant Has Been Spotted in the Wild May 17, 2021 This month has begun with shocking news since cybersecurity researchers have revealed a new malspam campaign. It discovered that the...
Blog Post Apple’s Craig Federighi Thinks DMA Will Open A “Pandora’s Box of Malware January 7, 2022 During this year’s Web Summit, a technology conference that is held annually in Lisbon, Portugal, Apple’s Craig Federighi, the Senior...
Blog Post Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple...
Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected...
Blog Post Unsophisticated Nigerian Threat Actor Threatening to Ground the Airline Industry Through Commodity Malware October 7, 2021 For the past five years, a suspected unsophisticated threat actor has been wreaking havoc on the airline and other industries...
Knowledge Center Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is...
Blog Post SysJoker – A New Multi-Platform Backdoor Malware Targeting Microsoft, Mac, and Linux Systems January 26, 2022 A new, multi-platform backdoor malware was discovered in December 2021, targeting Windows, Linux, and Mac systems. The backdoor has been...
Blog Post The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash...