In the new cryptomining module we discovered and described in our previous article, the cybercriminals behind the Stantinko botnet introduced several obfuscation techniques, some of which have not yet ...
If you post your email address as is in the profile section of SNS, it will be collected by scraping and sent as spam, so if you post it as is, it will be collected by scraping and sent as spam. Such ...
A new Python-based malware called VVS stealer has been identified, targeting Discord users with stealthy techniques to steal ...
Skilled attackers continually seek out new attack vectors, while employing evasion techniques to maintain the effectiveness of old vectors, in an ever-changing defensive landscape. Many of these ...
Last month, my colleague Sébastien Duquette detailed the home campaign, a long-lasting operation consisting of compromised web servers running a malicious Apache module named Darkleech (detected by ...
Attackers are increasingly changing up the techniques used to obfuscate what their software is doing, with one group hiding parts of their code using a variety of techniques swapped out every 37 days ...
A set of malicious gaming applications for Android available on the Google Play Store employ obfuscation at multiple levels and antiemulation techniques to avoid detection. There are six malicious ...
The development fits a trend that sees threat actors turning to well-known, commodity malware, overcoming its easy detection with ever-better obfuscation methods. A new malware sample using a rare ...
A threat campaign active since January customizes long-used droppers to infect victim machines and lift credentials and other data from browsers, according to Cisco Talos. Researchers warn hackers are ...
At one point while browsing the web you have probably run into a web site that pretends to be Microsoft or Google stating that something is wrong with your computer and telling you to call a listed ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results