Detecting Hidden Backdoors in PHP OPcache
In this article, we will be looking at the strategies to detect and analyze malware hidden inside an OPcache file. If you haven’t read our previous article about hiding aRead More →
In this article, we will be looking at the strategies to detect and analyze malware hidden inside an OPcache file. If you haven’t read our previous article about hiding aRead More →
Bank in Philippines was also targeted by attackers, whose malware shares code with tools used by Lazarus group. Symantec has found evidence that a bank in the Philippines has alsoRead More →
A while back I was exploring userland COM and stumbled across some 2011 research by Jon Larimer explaining the dangers of per-user COM objects. Recently Casey Smith (@subtee)started digging intoRead More →
For cryptocurrency enthusiasts seeking mainstream adoption, events like this are so unhelpful. Hackers appear to have made off with the equivalent of $2 million in digital currencies from Gatecoin, accordingRead More →
A well known malvertising gang famous for its use of the fingerprinting technique and other evasion tricks to bypass security checks has been ramping up its activity against many different ad platforms to pushRead More →
WordPress is a free, open source content management system (CMS) for creating websites, and is considered to be the most popular blogging system in use. WordPress’ appeal to website developers stems from itsRead More →
Attack on NS1 sends 50 million to 60 million lookup packets per second. Unknown attackers have been directing an ever-changing army of bots in a distributed denial of service (DDoS) attackRead More →
Numbers so random no one can predict how random they’ll be. The Tor project has cooked up a new way to generate random numbers to help secure its next-generation onion router.Read More →
Copy-pasting commands into your terminal allows attackers to append, automatically execute and then hide malicious code. This type of attack is known as clipboard hijacking, and in most scenarios, itRead More →
WPAD name collision issue can lead to MitM attacks. US-CERT has issued a public alert after researchers from the University of Michigan and Verisign Labs discovered a method of leveraging theRead More →
WhatsApp users being lured into downloading WhatsApp Gold, an information stealing malware App. If you are one of the billions using the hugely popular cross-platform messaging App, WhatsApp, you may haveRead More →
Little has been published on the threat actors responsible for Operation Ke3chang since the report was released more than two years ago. However, Unit 42 has recently discovered the actorsRead More →
Short Bytes: Symantec’s automated threat analysis system, Norton Safe Web, claims that Linux kernel’s website kernel.org contains 4 threats and shows a red flag to the users. Looking at Norton’sRead More →
An 18-year-old man has been charged by British police in connection with an internet attack that saw Mumsnet hacked, users’ accounts breached, passwords stolen, and the site blasted offline. DavidRead More →
From the beginning of this year, we are observing rapid development of DMA Locker. First, the threat was too primitive to even treat it seriously. Then it evolved to more complexRead More →
In the first week of May 2016, FireEye’s DTI identified a wave of emails containing malicious attachments being sent to multiple banks in the Middle East region. The threat actorsRead More →
Over 1.4 billion Yen was reportedly stolen in a span of two and a half hours across automated teller machines (ATMs) found in over 1,400 convenience stores in Japan thisRead More →
The hacker responsible for leaking 400GB of data from Italian spyware firm Hacking Team has published a tutorial video showing those seeking to follow in his footsteps how to hackRead More →
A wide-scale study of online trackers carried out by researchers at Princeton University has identified a new technique being used to try to strip web users of their privacy, as wellRead More →
RFID was supposed to revolutionize asset tracking, replacing the barcode everywhere. Or at least that was the prediction once tags got under five cents apiece. They still cost seven toRead More →