Threat analysis

MalwareBytesSecurity

Yet another flaw in Apple’s “iamroot” bug fix

Credit to Author: Thomas Reed| Date: Mon, 04 Dec 2017 17:05:12 +0000

Flaws in Apple’s response to the “iamroot” vulnerability show that some systems can remain vulnerable even after applying the patch.

Categories:

Tags:

(Read more…)

The post Yet another flaw in Apple’s “iamroot” bug fix appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Augmented Reality games and real-world trolling

Credit to Author: Christopher Boyd| Date: Mon, 13 Nov 2017 19:46:42 +0000

The popular Augmented Reality game Ingress has had some issues with third-party tools causing headaches for players. Could your love for a mobile game result in real-world problems? Read on and find out.

Categories:

Tags:

(Read more…)

The post Augmented Reality games and real-world trolling appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Disdain exploit kit and a side of social engineering deliver Neutrino Bot

Credit to Author: Jérôme Segura| Date: Fri, 10 Nov 2017 00:23:26 +0000

Exploits may not be enough as threat actors combine them with social engineering in a new Disdain exploit kit attack method.

Categories:

Tags:

(Read more…)

The post Disdain exploit kit and a side of social engineering deliver Neutrino Bot appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Analyzing malware by API calls

Credit to Author: Pieter Arntz| Date: Tue, 31 Oct 2017 18:59:11 +0000

As an alternative to reverse engineering malware that is protectively packed, we look at the option of analyzing malware by API calls to determine what a file might be up to.

Categories:

Tags:

(Read more…)

The post Analyzing malware by API calls appeared first on Malwarebytes Labs.

Read More