Fighting persistent malware with a UEFI scanner
The short answer to the headline’s question is that a UEFI scanner is all about helping you protect your computer against people who seek to take it over by abusingRead More →
Malware News | Infosec Blog | Information Security Tutorials
The short answer to the headline’s question is that a UEFI scanner is all about helping you protect your computer against people who seek to take it over by abusingRead More →
Wikileaks released the first batch of documents starting with the source code and development logs of the Project Hive. Today the popular whistleblower organization Wikileaks announced a new Vault 8 series that shedRead More →
Security experts have discovered a new hacking tool dubbed NEW IPCAM EXPLOIT containing a backdoor that is offered on several underground hacking forums. Wannabe hackers, be careful out of free hackingRead More →
For the past several weeks, Forcepoint Security Labs have been tracking a seemingly low-profile piece of malware which piqued our interest for a number of reasons: few samples appear toRead More →
Multiple online user reports claim that the MantisTek GK2 mechanical keyboard’s configuration software is sending data to an Alibaba server. One of the reports even includes an analysis of the software’s traffic, which seemsRead More →
Felismus malware deployed to steal documents and carry out surveillance on government foreign policy in a previously unknown campaign. A previously unknown hacking and espionage operation is using malware toRead More →
A group of researchers demonstrated that malware signed with stolen Digital code-signing certificates continues to bypass security software. A recent study conducted by the Cyber Security Research Institute (CSRI) revealedRead More →
In our walk in linux, there comes a point where we need to hack ( pentest ) in a safe environment. The first thing we usually do is install VirtualizationRead More →
Deep Instinct has detected a new variant of the banking trojan, CoreBot. CoreBot is a rather sophisticated banking malware and information stealer that was mainly active in the summer of 2015.Read More →
It has become common for users to use Google to find information that they do not know. In a quick Google search you can find practically anything you need toRead More →
In September 2017, we discovered a new targeted attack on financial institutions. Victims are mostly Russian banks but we also found infected organizations in Malaysia and Armenia. The attackers wereRead More →
Weak or reused passwords are a common cause of security breaches but are something that it’s hard for administrators to police. Intelligence-led security company FireEye is releasing a new password cracking toolRead More →
Apparently, a pirate download of Microsoft Office could be the root of all the trouble. Kaspersky has acknowledged that code belonging to the US National Security Agency (NSA) was liftedRead More →
A new ransomware outbreak today and has hit some major infrastructure in Ukraine including Kiev metro. Here are some of the details about this new variant. Drive-by download via watering holeRead More →
Microsoft explains how its next-gen security can protect files from being encrypted by ransomware extortionists. The Windows 10 Fall Creators Update is rolling out now with a security feature thatRead More →
Several transportation organizations in Ukraine and as well as some governmental organizations have suffered a cyberattack, resulting in some computers becoming encrypted, according to media reports. Public sources have confirmedRead More →
Canada’s Communications Security Establishment (CSE) intel agency has released the source code for one of its malware analysis tools dubbed Assemblyline. The Canada’s Communications Security Establishment (CSE) intelligence agency hasRead More →
When it comes to cyberthreats, we in ESET-LATAM Research often see ransomware, banking trojans (especially in my home country – Brazil), botnets or worms. As a consequence, other types ofRead More →
ATM systems appear to be very secure, but the money can be accessed fairly easily if you know what you are doing. Criminals are exploiting hardware and software vulnerabilities toRead More →
Data hungry malware tries to hook you with bogus forms and fake PDFs. jRAT malware users targeted US taxpayers with fake IRS tax documents, and now the same trick is beingRead More →