Researchers by cybersecurity firm Nyotron has discovered a new way that lets windows malware to modify files in a unique style that current anti-ransomware solutions are unable to identify.Continue reading “RIPlace: a new evasion technique that allows ransomware to bypass most antivirus”
Recently, researchers from Palo Alto Networks’ threat intelligence team Unit 42 have uncovered the first instance case of a cryptojacking worm that propagates via malicious Docker images.Continue reading “Meet Graboid, the first cryptojacking worm that spreads using Docker images: how to defend your infrastructure from this new threat?”
Stealth Falcon is a state-sponsored cyber espionage group that since 2012 targets political activists and journalists in the Middle East.Continue reading “Win32/StealthFalcon malware uses Windows Background Intelligent Transfer Service (BITS) to communicates to its C&C servers”
According to security firm Check Point, a newly discovered Android malware that replaces portions of apps with its own code has infected more than 25 million devices.Continue reading “‘Agent Smith’ malware has infected Android apps on 25 million devices”
2018’s security trends: malicious cryptomining
Malicious cryptomining, also sometimes called drive-by mining, is when someone else is using your computer to mine cryptocurrency like Bitcoin or Monero: essentially, they are stealing your resources to make money.