Detecting Hidden Backdoors in PHP OPcache
In this article, we will be looking at the strategies to detect and analyze malware hidden inside an OPcache file. If you haven’t read our previous article about hiding aRead More →
In this article, we will be looking at the strategies to detect and analyze malware hidden inside an OPcache file. If you haven’t read our previous article about hiding aRead More →
Bank in Philippines was also targeted by attackers, whose malware shares code with tools used by Lazarus group. Symantec has found evidence that a bank in the Philippines has alsoRead More →
A while back I was exploring userland COM and stumbled across some 2011 research by Jon Larimer explaining the dangers of per-user COM objects. Recently Casey Smith (@subtee)started digging intoRead More →
For cryptocurrency enthusiasts seeking mainstream adoption, events like this are so unhelpful. Hackers appear to have made off with the equivalent of $2 million in digital currencies from Gatecoin, accordingRead More →
A well known malvertising gang famous for its use of the fingerprinting technique and other evasion tricks to bypass security checks has been ramping up its activity against many different ad platforms to pushRead More →
WordPress is a free, open source content management system (CMS) for creating websites, and is considered to be the most popular blogging system in use. WordPress’ appeal to website developers stems from itsRead More →
Attack on NS1 sends 50 million to 60 million lookup packets per second. Unknown attackers have been directing an ever-changing army of bots in a distributed denial of service (DDoS) attackRead More →
Numbers so random no one can predict how random they’ll be. The Tor project has cooked up a new way to generate random numbers to help secure its next-generation onion router.Read More →
Copy-pasting commands into your terminal allows attackers to append, automatically execute and then hide malicious code. This type of attack is known as clipboard hijacking, and in most scenarios, itRead More →
WPAD name collision issue can lead to MitM attacks. US-CERT has issued a public alert after researchers from the University of Michigan and Verisign Labs discovered a method of leveraging theRead More →