RIPlace: a new evasion technique that allows ransomware to bypass most antivirus

Researchers by cybersecurity firm Nyotron has discovered a new way that lets windows malware to modify files in a unique style that current anti-ransomware solutions are unable to identify.

Continue reading “RIPlace: a new evasion technique that allows ransomware to bypass most antivirus”

Meet Graboid, the first cryptojacking worm that spreads using Docker images: how to defend your infrastructure from this new threat?

Recently, researchers from Palo Alto Networks’ threat intelligence team Unit 42 have uncovered the first instance case of a cryptojacking worm that propagates via malicious Docker images.

Continue reading “Meet Graboid, the first cryptojacking worm that spreads using Docker images: how to defend your infrastructure from this new threat?”

Win32/StealthFalcon malware uses Windows Background Intelligent Transfer Service (BITS) to communicates to its C&C servers

Stealth Falcon is a state-sponsored cyber espionage group that since 2012 targets political activists and journalists in the Middle East.

Continue reading “Win32/StealthFalcon malware uses Windows Background Intelligent Transfer Service (BITS) to communicates to its C&C servers”

‘Agent Smith’ malware has infected Android apps on 25 million devices

According to security firm Check Point, a newly discovered Android malware that replaces portions of apps with its own code has infected more than 25 million devices.

Continue reading “‘Agent Smith’ malware has infected Android apps on 25 million devices”

What is malicious cryptomining and how can i protect my computer from unwanted mining?

2018’s security trends: malicious cryptomining

Malicious cryptomining, also sometimes called drive-by mining, is when someone else is using your computer to mine cryptocurrency like Bitcoin or Monero: essentially, they are stealing your resources to make money.

Continue reading “What is malicious cryptomining and how can i protect my computer from unwanted mining?”