Sophos

SecuritySophos

How I learned to stop worrying and love ‘grey hat’ tools

Credit to Author: Tad Heppner| Date: Tue, 25 Feb 2020 13:45:19 +0000

A comprehensive security solution needs a sense of subtlety: not all machine code lends itself to be classified easily as malicious. As with most things in life, there&#8217;s a grey area in malware detection that includes hacking tools, poorly designed or easily exploitable applications, or borderline adware that provides little benefit to the unfortunate user [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/TR1pieWZO1k” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

‘Cloud Snooper’ Attack Bypasses Firewall Security Measures

Credit to Author: Sergei Shevchenko| Date: Tue, 25 Feb 2020 13:30:43 +0000

In the course of investigating a malware infection of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, SophosLabs discovered a sophisticated attack that employed a unique combination of techniques to evade detection and that permits the malware to communicate freely with its command and control (C2) servers through a firewall that should, [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/IHnT34CbOqM” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

Nearly a quarter of malware now communicates using TLS

Credit to Author: Luca Nagy| Date: Tue, 18 Feb 2020 13:30:07 +0000

Encryption is one of the strongest weapons malware authors can leverage: They can use it to obfuscate their code, to prevent users (in the case of ransomware) from being able to access their files, and for securing their malicious network communication. As websites and apps more widely adopt TLS (Transport Layer Security) and communicate over [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/XXvUtjG7XVU” height=”1″ width=”1″ alt=””/>

Read More