Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 81 to 90
Emotet Adds New Evasion Technique And Uses Connected Devices As Proxy C&C Servers
25th Apr 2019 [one month ago] from TrendMicro
Recently, an analysis of Emotet traffic has revealed that new samples use a different POST-infection traffic than previous versions. It is also attempting to use compromised connected devices as proxy command and control (CC) servers that...
CARBANAK Week Part Four: The CARBANAK Desktop Video Player
25th Apr 2019 [one month ago] from FireEye Research
PartOne, PartTwo and PartThree of CARBANAK Week are behind us. In this final blog post, wedive into one of the more interesting tools that is part of theCARBANAK toolset. The CARBANAK authors wrote their own video playerand we happened...
Over 23 Million Breached Accounts Used ‘123456’ As Password
25th Apr 2019 [one month ago] from ESET Research
The notorious six-digit string continues to reign supreme among the most-hacked passwords The post Over 23 million breached accounts used ‘123456’ as password appeared first on WeLiveSecurity
NovaLoader, Yet Another Brazilian Banking Malware Family
24th Apr 2019 [one month ago] from Zscaler
As part of our daily threat tracking activity, ThreatLabZ researchers recently came across an interesting Brazilian banking malware campaign. The malware, NovaLoader, was written in Delphi and made extensive use of Visual Basic Script (VBS)...
CARBANAK Week Part Three: Behind The CARBANAK Backdoor
24th Apr 2019 [one month ago] from FireEye Research
We covered a lot of ground in PartOne and PartTwo of our CARBANAK Week blog series. Now lets take a look backat some of our previous analysis and see how it holds up.In June 2017, we published a blog post sharing novelinformation about...
Uncovering CVE-2019-0232: A Remote Code Execution Vulnerability In Apache Tomcat
24th Apr 2019 [one month ago] from TrendMicro
CVE-2019-0232 is a vulnerability in Apache Tomcat that could allow attackers to execute arbitrary commands by abusing an operating system command injection brought about by a Tomcat CGI Servlet input validation error. The post Uncovering...
WannaCryptor ‘accidental Hero’ Pleads Guilty To Malware Charges
23rd Apr 2019 [one month ago] from ESET Research
Marcus Hutchins, who is best known for his inadvertent role in blunting the WannaCryptor outbreak two years ago, may now face a stretch behind bars The post WannaCryptor ‘accidental hero’ pleads guilty to malware charges appeared first...
CARBANAK Week Part Two: Continuing The CARBANAK Source Code Analysis
23rd Apr 2019 [one month ago] from FireEye Research
In the previousinstallment, we wrote about how string hashing was used inCARBANAK to manage Windows API resolution throughout the entirecodebase. But the authors used this same string hashing algorithm foranother task as well. In this installment,...
Analysis: Abuse Of Custom Actions In Windows Installer MSI To Run Malicious JavaScript, VBScript, And PowerShell Scripts
23rd Apr 2019 [one month ago] from TrendMicro
We recently discovered malicious Microsoft Software Installation (MSI) files that download and execute other files, and could bypass traditional security solutions. Malicious actors can abuse custom actions in these files to execute malicious...
Who’s Behind The RevCode WebMonitor RAT?
22nd Apr 2019 [one month ago] from Krebsonsecurity
The owner of a Swedish company behind a popular remote administration tool (RAT) implicated in thousands of malware attacks shares the same name as a Swedish man who pleaded guilty in 2015 to co-creating the Blackshades RAT, a similar...
« Newer 4 5 6 7 8 9 10 11 12 13 Older »