Caution: Misuse of security tools can turn against you

If not implemented correctly, the very security tools we use to keep our information private may actually cause data leaks themselves. We outline a few cases and provide suggestions for researchers and security admins.

Read more

Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT

A threat actor implements a newer vulnerability exploited in Internet Explorer to serve up the Quasar RAT and diversify the portfolio of attacks.

Read more

CryptoBlock ransomware and its C2

CryptoBlock is an interesting ransomware to keep an eye on. We expect this to be a ransomware that is in development to eventually develop into a RaaS (Ransomware as a Service).

Read more

Process Explorer: an introduction

We give you a short introduction to Process Explorer and showed you a few ways to use it when you are trying to identify a possible malware problem with your Windows system.

Read more

Select your language