How I learned to stop worrying and love ‘grey hat’ tools

Credit to Author: Tad Heppner| Date: Tue, 25 Feb 2020 13:45:19 +0000

A comprehensive security solution needs a sense of subtlety: not all machine code lends itself to be classified easily as malicious. As with most things in life, there&#8217;s a grey area in malware detection that includes hacking tools, poorly designed or easily exploitable applications, or borderline adware that provides little benefit to the unfortunate user [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/TR1pieWZO1k” height=”1″ width=”1″ alt=””/>

Read more

Old Phantom Crypter upends malicious document tools

Credit to Author: Gabor Szappanos| Date: Thu, 14 Feb 2019 15:10:42 +0000

As the new year began, the makers of tools that generate the malicious documents used in social engineering spam attacks threw out the rule book and started fresh with an entirely new batch of Office exploits<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/l3gQLk92YYk” height=”1″ width=”1″ alt=””/>

Read more