malware

MalwareBytesSecurity

Analyzing a new stealer written in Golang

Credit to Author: hasherezade| Date: Wed, 30 Jan 2019 17:00:00 +0000

We captured a new information-stealing malware written in Golang (Go). Read up on our analysis of its functionality, as well as the tools researchers can use to unpack malware written in this relatively new programming language.

Categories:

Tags:

(Read more…)

The post Analyzing a new stealer written in Golang appeared first on Malwarebytes Labs.

Read More
QuickHealSecurity

Anatova, A modular ransomware

Credit to Author: Shriram Munde| Date: Tue, 29 Jan 2019 06:09:49 +0000

While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick Heal Security Labs has discovered the first ransomware of 2019 — Anatova ransomware. During our analysis, we found that Anatova is not just ransomware but a modular one. By modular ransomware we…

Read More
IndependentSecuriteam

REVIEW – “The Florentine Deception”, Carey Nachenberg

Credit to Author: p1| Date: Wed, 10 Jun 2015 16:22:25 +0000

BKFLODEC.RVW   20150609 “The Florentine Deception”, Carey Nachenberg, 2015, 978-1-5040-0924-9, U$13.49/C$18.91 %A   Carey Nachenberg http://florentinedeception.com %C   345 Hudson Street, New York, NY   10014 %D   2015 %G   978-1-5040-0924-9 150400924X %I   Open Road Distribution %O   U$13.49/C$18.91 www.openroadmedia.com %O  http://www.amazon.com/exec/obidos/ASIN/150400924X/robsladesinterne http://www.amazon.co.uk/exec/obidos/ASIN/150400924X/robsladesinte-21 %O   http://www.amazon.ca/exec/obidos/ASIN/150400924X/robsladesin03-20 %O   Audience n+ Tech 3 Writing 2 (see revfaq.htm for explanation) %P   321 p. %T   “The … Continue reading REVIEW – “The Florentine Deception”, Carey Nachenberg

Read More
MalwareBytesSecurity

Hosting malicious sites on legitimate servers: How do threat actors get away with it?

Credit to Author: Pieter Arntz| Date: Fri, 18 Jan 2019 16:00:00 +0000

Is money all hosting providers care about when it comes to allowing malicious sites on their servers? Or is there more at play? We embark on an investigation to discover their motives.

Categories:

Tags:

(Read more…)

The post Hosting malicious sites on legitimate servers: How do threat actors get away with it? appeared first on Malwarebytes Labs.

Read More
ScadaICSSchneider

Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late

Credit to Author: Steven Carlini| Date: Wed, 16 Jan 2019 16:00:00 +0000

It’s been well publicized that Microsoft fends off more than 7 trillion cyberthreats per day, and allocates over $1 billion each year to cybersecurity for its cloud data centers. While… Read more »

The post Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late appeared first on Schneider Electric Blog.

Read More