Search Results for: malicious code Blog Post What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?... Blog Post Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private... Blog Post What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have... Blog Post A Google Chrome Extension Steals Crypto-wallet Keys January 8, 2020 Recently, a code was found injected in a Google Chrome extension named “Shitcoin Wallet” for stealing the passwords and private... Knowledge Center Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)... Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data... Blog Post What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in... Blog Post Threat actors exploiting the novel corona virus epidemic (COVID-19) March 19, 2020 As the WHO has declared COVID-19 to be a global pandemic, we have seen a large increase in the exploitation... Blog Post A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Blog Post A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... Blog Post New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated... Blog Post The latest ransomware: Kupidon ransomware July 6, 2020 The latest ransomware called Kupidon has been discovered by MalwareHunterTeam. The virus targets both personal and corporate networks to steal... Blog Post Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and... Blog Post How to Detect Malicious Activity Early? Set up IOCs May 6, 2020 Indicators of Compromise (IOCs) are forensic data IT professionals use to detect malicious activity. It is defined as “pieces of... Knowledge Center Case Study – Phishing Test January 29, 2020 Phishing test to ensure implemented security measures remain effective. LIFARS regularly conducts phishing tests, in addition to penetration tests to...
Blog Post What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?...
Blog Post Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private...
Blog Post What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have...
Blog Post A Google Chrome Extension Steals Crypto-wallet Keys January 8, 2020 Recently, a code was found injected in a Google Chrome extension named “Shitcoin Wallet” for stealing the passwords and private...
Knowledge Center Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)...
Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data...
Blog Post What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in...
Blog Post Threat actors exploiting the novel corona virus epidemic (COVID-19) March 19, 2020 As the WHO has declared COVID-19 to be a global pandemic, we have seen a large increase in the exploitation...
Blog Post A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Blog Post A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions...
Blog Post New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated...
Blog Post The latest ransomware: Kupidon ransomware July 6, 2020 The latest ransomware called Kupidon has been discovered by MalwareHunterTeam. The virus targets both personal and corporate networks to steal...
Blog Post Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and...
Blog Post How to Detect Malicious Activity Early? Set up IOCs May 6, 2020 Indicators of Compromise (IOCs) are forensic data IT professionals use to detect malicious activity. It is defined as “pieces of...
Knowledge Center Case Study – Phishing Test January 29, 2020 Phishing test to ensure implemented security measures remain effective. LIFARS regularly conducts phishing tests, in addition to penetration tests to...