Wietze Beukema: almost 300 Windows 10 executables are vulnerable to DLL hijacking
I’ve already written about DLL Hijacking, but today I’d like to share a really interesting research by Wietze Beukema.
Continue…I’ve already written about DLL Hijacking, but today I’d like to share a really interesting research by Wietze Beukema.
Continue…Researchers by cybersecurity firm Nyotron has discovered a new way that lets windows malware to modify files in a unique style that current anti-ransomware solutions are unable to identify.
Continue…Researchers from Cisco Talos recently discovered a new malware loader being used to deliver and infect systems using NodeJS as well as the legitimate open-source utility WinDivert.
Continue…A useful tool: fast and easy to use.
Continue…According to experts at ESET, the Windows zero-day vulnerability CVE-2019-1132 was exploited by the Buhtrap threat group in a targeted attack aimed at a government organization in Eastern Europe.
Continue…Malware researchers from Kaspersky have discovered new and improved versions of the FinFisher spyware, able o infect both Android and iOS devices.
According to the experts, the new versions have been active at least since 2018, one of the samples analyzed was used last month in Myanmar, where local government is accused of violating human rights.
Continue…According to security firm Check Point, a newly discovered Android malware that replaces portions of apps with its own code has infected more than 25 million devices.
Continue…Cybersecurity researchers Ran Dubin and Ariel Koren have developed a new platform form malware analysis, based on an AI engine.
Continue…Microsoft provides Shims to developers mainly for backward compatibility, but malware can take advantage of shims to target an executable for both persistence and injection.
Rootkits are tools and techniques used to hide malicious modules from being noticed by system monitoring.
Continue…