Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as...
The threat actors associated with the Gootkit malware have made “notable changes” to their toolset, adding new components and obfuscations to their...
Cybersecurity researchers have shed more light on a malicious loader that runs as a server and executes received modules in memory, laying...
The specialized team FireEye Email Security has published a report on the detection of multiple phishing campaigns in which operators use source...
ESET researchers bring to light unique obfuscation techniques discovered in the course of analyzing a new cryptomining module distributed by the Stantinko...
An Obfuscation-Neglect Android Malware Scoring System ConceptsAndroid malware analysis engine is not a new story. Every antivirus company has their own secrets...
Malware delivery trends change every day. For the last few years, we have observed various hacker groups like ( APT12 to Turla...
Threat actors want to maintain anonymity in their operations, especially in the art of virus development and phishing expedition. They continue to...
Cybercriminals are using the most sophisticated techniques to bypass the security controls in various organization such as IT, medical, manufacturing industries, energy...
Magniber ransomware emerges again leveraging various obfuscation techniques and with refined source codes. The most famous and long-running browser exploitation toolkit Magnitude...
This application assists in managing attack infrastructure for penetration testers by providing an interface to rapidly deploy, manage, and take down various...
Advance level threats are increasing day by day and attackers using more Sophisticated Techniques to bypass the Detection. Evasion and obfuscation technique...
A New persistent malware family called FakeBank spreading across Russian speaking nations and targetting Russian banks with sophisticated Obfuscation technique to steal...
The macro_pack is a tool used to automatize obfuscation and generation of MS Office documents for pentest, demo, and social engineering assessments....
Java Based Remote Access Trojan Called “jRAT” Rapidly Evolving with Advanced Capabilities and Targeting Many Organization Sensitive information that spreading with Highly...
Verint’s Cyber Research team has discovered an unknown variant of the Nymaim malware family, a group of threats that are also capable...
We look at malware delivered by a campaign that has infected thousands of websites around the world - and the various control...