Detecting Hidden Backdoors in PHP OPcache
In this article, we will be looking at the strategies to detect and analyze malware hidden inside an OPcache file. If you haven’t read our previous article about hiding aRead More →
Malware News | Infosec Blog | Information Security Tutorials
In this article, we will be looking at the strategies to detect and analyze malware hidden inside an OPcache file. If you haven’t read our previous article about hiding aRead More →
Bank in Philippines was also targeted by attackers, whose malware shares code with tools used by Lazarus group. Symantec has found evidence that a bank in the Philippines has alsoRead More →
A well known malvertising gang famous for its use of the fingerprinting technique and other evasion tricks to bypass security checks has been ramping up its activity against many different ad platforms to pushRead More →
Numbers so random no one can predict how random they’ll be. The Tor project has cooked up a new way to generate random numbers to help secure its next-generation onion router.Read More →
Little has been published on the threat actors responsible for Operation Ke3chang since the report was released more than two years ago. However, Unit 42 has recently discovered the actorsRead More →
Short Bytes: Symantec’s automated threat analysis system, Norton Safe Web, claims that Linux kernel’s website kernel.org contains 4 threats and shows a red flag to the users. Looking at Norton’sRead More →
From the beginning of this year, we are observing rapid development of DMA Locker. First, the threat was too primitive to even treat it seriously. Then it evolved to more complexRead More →
In the first week of May 2016, FireEye’s DTI identified a wave of emails containing malicious attachments being sent to multiple banks in the Middle East region. The threat actorsRead More →
University of Texas researchers find a way to merge two low-quality sources of random numbers into high-quality output. Two researchers from the University of Texas have published a paper thatRead More →
In surprising end to TeslaCrypt, the developers shut down their ransomware and released the master decryption key. Over the past few weeks, an analyst for ESET had noticed that the developers of TeslaCrypt haveRead More →