Microsoft Azure Bastion and Azure Container Registry have each been found to have one potentially “dangerous” security flaw that, if taken advantage...
Cybersecurity researchers have decoded the mechanism by which the versatile Qakbot banking trojan handles the insertion of encrypted configuration data into the...
A new malware with highly-capable JavaScript RAT, which is paired with a C# keylogger has been discovered by the security analysts at...
Prevailion security specialists report that a newly identified spear phishing campaign is distributing a new remote access Trojan (RAT) capable of manipulating...
A new JavaScript-based remote access Trojan (RAT) propagated via a social engineering campaign has been observed employing sneaky “fileless” techniques as part...
Just a nice persistence trick to confuse DFIR investigation. Uses NtSetValueKey native API to create a hidden (null terminated) registry key. This...
fingerprint Monitoring Registry and File Changes in Windows – forensic analytics for windows registry and files “fingerprint” records the state of a...
SharpHide Just a nice persistence trick to confuse DFIR investigation. Uses NtSetValueKey native API to create a hidden (null-terminated) registry key. This...
If you’re a Windows user, chances are quite less you haven’t opened Windows Registry after tweaking some values just the way a...
Domain registration and management involves multiple parties with different roles, like Registry, Registrar, Reseller & Registrant (Domain Name Hierarchy). On top of...
Windows Digital Signature check is a mechanism included in Microsoft Windows to make sure that the software or driver you’re trying to...
Nowadays Hackers Distributing Advanced Fileless Malware with Evasion capabilities which are very Difficult to Detect. These types of malware sit in the...
In recent months, we have started to receive various reports about suspicious and malicious registry keys that had been created on users’...
Short Bytes: Registry Cleaners are the software which does the job of removing outdated registry entries from Windows registry. These registry entries...
Short Bytes: The Windows Registry could be considered a big collection of all the details about your computer. It has information about...
Short Bytes: If you are willing to reinstall your Windows operating system, it’s possible that you’ll be stuck at some point due...
Flaw allowed anyone to edit & take control over .as domains. A British security researcher that goes online only by the name of...
Kovter Trojan can hide in Windows registry and does not need to be stored on the computer’s hard drive- claims Symantec —...
Symantec’s researchers have discovered a new version of the Kovter trojan, which now mimics the Poweliks malware and is able to live...
A telemarketing company has been hit with a $7.5m fine for repeatedly contacting people on the Do Not Call Registry - the...