Malware analysis October 7, 2020 Howard Poston Inside the Lyceum/Hexane malware Lyceum and Hexane are two industry designations for an APT group that was discovered in August 2019 and was operating without detection for at least a year...
Malware analysis October 1, 2020 Greg Belding Tycoon malware: What it is, how it works and how to prevent it | Malware spotlight It has been said that a picture is worth a thousand words. In the world of malware, a picture is worth an infection — in other words, a picture can actually...
Malware analysis September 17, 2020 Pedro Tavares LockBit malware: What it is, how it works and how to prevent it | Malware spotlight LockBit is a data encryption malware in operation since September 2019 and a recent Ransomware-as-a-Service (RaaS), in which developers are in charge of the...
Malware analysis September 16, 2020 Greg Belding Purple Fox malware: What it is, how it works and how to prevent it Without question, there has been a marked die-off in the usage of Exploit Kits (EK). The Purple Fox exploit kit is a type of malware that is defying this recent...
Malware analysis September 15, 2020 Pedro Tavares Ransomware deletion methods and the canary in the coal mine Ransomware is an emergent threat. Every week, there is a new and notable outbreak of this class of data encryption malware. From Ragnar Locker to Netwalker,...
Malware analysis September 10, 2020 Greg Belding USBCulprit malware: What it is, how it works and how to prevent it Info stealers have been a part of the attacker arsenal since the early days of malware. Less common is a malware that can steal information from an air-gapped...
Malware analysis September 8, 2020 Nitesh Malviya Using Base64 for Malware Obfuscation What is Malware – Malware stands for malicious software and software, in simple language, means some program written in any programming language. So if a...
Malware analysis September 2, 2020 Greg Belding FlowCloud malware: What it is, how it works and how to prevent it I wish I could say that attack campaigns that target the United States energy sector do not exist, but unfortunately they do. The attack group behind the infamous...
Malware analysis August 27, 2020 Fakhar Imam Kaiji malware: What it is, how it works and how to prevent it | Malware spotlight Trend Micro recently reported that they have detected variants of two existing Linux OS botnet malware types, known as XORDDoS malware, that targeted exposed...
Malware analysis August 26, 2020 Daniel Brecht xHelper malware: What it is, how it works and how to prevent it | Malware spotlight Research shows malware spreading and directed specifically at mobile users. Check Point’s 2019 Mid-Year Trends Report shows that cyberattacks targeting smartphones...