New ‘Under the Radar’ report examines modern threats and future technologies

Malwarebytes released a new report called “Under the Radar: The Future of Undetected Malware” that takes a look at current threats using next generation tricks, and how current security technologies stand up to these threats, as well as the threats to come.

Read more

What’s new in TrickBot? Deobfuscating elements

TrickBot has been present in the threat landscape from quite a while. We wrote about its first version in October 2016. October 2018 marks end of the second year since TrickBot’s appearance. Possibly the authors decided to celebrate the anniversary by a makeover of some significant elements of the core. This post is an analysis of the updated obfuscation used by TrickBot’s main module.

Read more

Fileless malware: getting the lowdown on this insidious threat

In this series of articles, we provide an in-depth discussion of fileless malware and their related attacks. In part one, we cover a brief overview of the problems with and general features of fileless malware, laying the groundwork for technical analysis of various samples employing fileless and semi-fileless methods.

Read more

Malware analysis: decoding Emotet, part 2

In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun!

Read more

Elaborate scripting-fu used in espionage attack against Saudi Arabia Government entity

In this post, we take apart a clever set of scripts used in a targeted attack against the government of Saudi Arabia.

Read more

Learning PowerShell: basic programs

In this last part of the short series about the basics of PowerShell we assemble a small script from scratch and explain how it works.

Read more

Learning PowerShell: some basic commands

We are going to construct some basic PowerShell commands and explain how they work just to show you how useful PowerShell can be. For good and for bad.

Read more

A week in security (July 10 – July 16)

A compilation of security news and blog posts from the 10th of July to the 16th. We go over our PowerShell, an overview of the Petya ransomware family, and more.

Read more

Learning PowerShell: The basics

Get acquainted with some of the basic principles of Powershell and get prepared for some basic usage of this versatile tool that is available on all modern Windows systems.

Read more

New social engineering scheme triggers on mouse movement

No macro, no exploit. This attack uses mouse movement to launch malicious code in booby-trapped documents.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language