Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 21 to 30
IoT Attack Opportunities Seen In The Cybercrime Underground
10th Sep 2019 [14 days ago] from TrendMicro
We looked into IoT-related discussions from several cybercrime underground communities. We found discussions ranging from tutorials to actual monetization schemes for IoT-related attacks. The post IoT Attack Opportunities Seen in the Cybercrime...
Secret Service Investigates Breach At U.S. Govt IT Contractor
9th Sep 2019 [15 days ago] from Krebsonsecurity
The U.S. Secret Service is investigating a breach at a Virginia-based government technology contractor that saw access to several of its systems put up for sale in the cybercrime underground, KrebsOnSecurity has learned. The contractor...
Automated Incident Response In Office 365 ATP Now Generally Available
9th Sep 2019 [15 days ago] from Microsoft
Powerful automation capabilities help improve the effectiveness and efficiency of investigating and responding to Office 365 alerts. The post Automated incident response in Office 365 ATP now generally available appeared first on Microsoft...
‘Purple Fox’ Fileless Malware With Rookit Component Delivered By Rig Exploit Kit Now Abuses PowerShell
9th Sep 2019 [15 days ago] from TrendMicro
This new iteration of Purple Fox that we came across, also being delivered by Rig, has a few new tricks up its sleeve. It retains its rootkit component by abusing publicly available code. It now also eschews its use of NSIS in favor of...
ESET Discovered An Undocumented Backdoor Used By The Infamous Stealth Falcon Group
9th Sep 2019 [15 days ago] from ESET Research
ESET researchers discovered a backdoor linked to malware used by the Stealth Falcon group, an operator of targeted spyware attacks against journalists, activists and dissidents in the Middle East The post ESET discovered an undocumented...
Week In Security
6th Sep 2019 [18 days ago] from ESET Research
This week, we present an introduction to the MITRE ATT&CK framework, the review of the mobile threats and vulnerabilities detected for mobile during the first half of 2019, and Firefox 69 new features. The post Week in security appeared...
Malware Classification With ‘Graph Hash,’ Applied To The Orca Cyberespionage Campaign
6th Sep 2019 [18 days ago] from TrendMicro
In malware research, threat hunting and sharing of threat intelligence, such as exchanging indicators of compromise (IoCs) in the form of hashes (e.g., MD5s, SHA256s), are common industry practices and helpful for information security professionals....
Firefox 69: Third‑Party Tracking Cookies And Cryptomining Now Blocked By Default
6th Sep 2019 [18 days ago] from ESET Research
Firefox new Enhanced Tracking Protection (ETP) feature launched to all users of the browser to offer better privacy and protection from cryptojacjing. The post Firefox 69: Third‑Party Tracking Cookies and Cryptomining Now Blocked...
Open Sourcing StringSifter
5th Sep 2019 [19 days ago] from FireEye Research
Malware analysts routinely use the Stringsprogram during static analysis in order to inspect a binarysprintable characters. However, identifying relevant strings by hand istime consuming and prone to human error. Larger binaries produceupwards...
Semi‑annual Balance Of Mobile Security 2019
5th Sep 2019 [19 days ago] from ESET Research
Malware detections for iOS increased, as did the number of vulnerabilities detected in this operating system, while in the case of Android, the number of reported vulnerabilities decreased, although the number of highly critical bugs reported...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »