Teaching an old RAT new tricks
Attackers have been successfully deploying RATs for years to remotely control users systems – giving them full access to the victim’s files or resources such as cameras, recording key strokes,Read More →
Malware News | Infosec Blog | Information Security Tutorials
Attackers have been successfully deploying RATs for years to remotely control users systems – giving them full access to the victim’s files or resources such as cameras, recording key strokes,Read More →
Exploit kit’s inner workings exposed as researchers help shut down its servers. Security researchers at Cisco Talos and Check Point have published reports detailing the inner workings of Nuclear, an “exploitRead More →
How I Hacked Facebook, and Found Someone’s Backdoor Script(English Version) Foreword As a pentester, I love server-side vulnerabilities more than client-side ones. Why? Because it’s way much cooler to takeRead More →
The authors of the TeslaCrypt ransomware have improved it by implementing new sophisticated evasion techniques and targeting new file types. The authors of the TeslaCrypt ransomware have introduced a couple ofRead More →
Compromised websites remain one of the surefire ways to redirect innocent visitors to exploit kits. During the past few days we’ve started seeing an unusual route to the infamous Angler EK,Read More →
Ransomware has become the scourge of the web in recent months. Hospitals thrust back into the non-digital age, their files locked up until they paid hefty ransoms in Bitcoin. SchoolsRead More →
Google warns that surfing on Google.com is dangerous, here is why!. The world’s top website is partially dangerous for Internet users. We are not saying it but Google itself is claimingRead More →
The Ware Report’s recommendations still important as proven by ransomware and breaches. The National Security Archives at George Washington University has just added a classic text of computer security to itsRead More →
PowerShell scripts seen in around 38% of malware incidents. Microsoft’s PowerShell task automation framework is becoming one of the most popular tools for coding and enhancing malware, a Carbon Black studyRead More →
New evidence collected by prosecutors shows lottery machines were rigged to generate predictable numbers on specific days of the year. Last year, the security director of a US lottery was discoveredRead More →