According to security firm Check Point, a newly discovered Android malware that replaces portions of apps with its own code has infected more than 25 million devices.
2018’s security trends: malicious cryptomining Malicious cryptomining, also sometimes called drive-by mining, is when someone else is using your computer to mine cryptocurrency like Bitcoin or Monero: essentially, they are stealing your resources to make money.
Dynamic and static malware analysis using a lot of preconfigured environments.
This article on Microsoft’s Technet Blog is really interesting: Moti Bani explain how to investigate suspicious activity on servers using Sysmon Tool.
Once executed on target system, a malware try to hide itself and achieving persistence on the exploited machine, in order to continue to act even after system reboot. Today let’s try to focus on Windows systems, which have a lot of areas through which the persistence can be achieved. The Windows Registry Run/RunOnce Keys As I […]