VideoBytes: Offensive security tools and the bad guys that use them

Credit to Author: Malwarebytes Labs| Date: Thu, 24 Dec 2020 16:30:14 +0000

In this Videobyte, we’re talking about what penetration testing tools malware gangs love to use and why they are better than what you can get on the black market.

Categories: VideoBytes

Tags:

(Read more…)

The post VideoBytes: Offensive security tools and the bad guys that use them appeared first on Malwarebytes Labs.

Read more

Threat profile: Egregor ransomware is making a name for itself

Credit to Author: Pieter Arntz| Date: Tue, 15 Dec 2020 13:58:58 +0000

The Egregror ransomware is quickly making a name for itself by victimizing big corporations. How does it work and what is its background?

Categories: RansomwareThreat spotlight

Tags:

(Read more…)

The post Threat profile: Egregor ransomware is making a name for itself appeared first on Malwarebytes Labs.

Read more

Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature

Credit to Author: Threat Intelligence Team| Date: Wed, 17 Jun 2020 17:30:00 +0000

A newly discovered APT spear-phishing attack implements several evasion techniques to drop Cobalt Strike toolkit.

Categories:

Tags:

(Read more…)

The post Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature appeared first on Malwarebytes Labs.

Read more

How I learned to stop worrying and love ‘grey hat’ tools

Credit to Author: Tad Heppner| Date: Tue, 25 Feb 2020 13:45:19 +0000

A comprehensive security solution needs a sense of subtlety: not all machine code lends itself to be classified easily as malicious. As with most things in life, there&#8217;s a grey area in malware detection that includes hacking tools, poorly designed or easily exploitable applications, or borderline adware that provides little benefit to the unfortunate user [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/TR1pieWZO1k” height=”1″ width=”1″ alt=””/>

Read more