Fake IRS notice delivers customized spying tool

Threat actors leverage a Microsoft Office exploit to spy on their victims. In this blog post, we will review its delivery mechanism and analyze the malware we observed, a modified version of a commercial Remote Administration Tool (RAT).

Read more

A week in security (September 11 – September 17)

A compilation of security news and blog posts from the 11th – 17th September. We look at 0days, more Equifax developments, our usual smattering of blog posts, and more!

Read more

[Updated] Infected CCleaner downloads from official servers

In a supply chain attack that may be unprecedented in number of downloads download servers hosting CCleaner, distributed by Avast have been delivering a version of CCleaner with malware on top.

Read more

Explained: YARA rules

YARA is a tool that can be used to identify files that meet certain conditions. It is mainly in use by security researchers to classify malware.

Read more

Remediation vs. prevention: How to place your bets

Building a security environment for businesses is a gamble these days. It’s remediation vs. prevention. Which should you bet on?

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language