We recently encountered a large obfuscated malware sample that offered several interesting analysis challenges. It used virtualization that prevented us from producing a fully-deobfuscated memory dump...
Read moreWhy hack into a server when you can just send vistors to a fake alternative instead?
Read moreApplying the 80-20 Rule to Cybersecurity
July 7 2020How security teams can achieve 80% of the benefit for 20% of the work.
Read moreIoT Security Principles
July 7 2020The BSA -- also known as the Software Alliance, formerly the Business Software Alliance (which explains the acronym) -- is an industry lobbying group. They just published "Policy Principles...
Read moreIt's a short jump from a Rolls Royce ride to extradition from the UAE. Goodbye, Dubai, goodbye, Palazzo Versace, hello, Chicago jail cell.
Read moreThe two extraditions of business email compromise attackers indicate a step forward for international law enforcement collaboration.
Read moreThe US Cybersecurity and Infrastructure Security Agency encourages organizations to patch a critical flaw in the BIG-IP family of application delivery controllers, as firms find evidence that attackers are...
Read moreSince at least May 2019, the state-sponsored threat actor has stolen card data from dozens of retailers, including major US firms.
Read moreThe payment-card skimmer targets websites hosted on Microsoft IIS servers and running the ASP.NET web framework.
Read moreAndroid Adware Tied to Undeletable Malware
July 6 2020Adware on inexpensive Android smartphone can carry additional malware and be undeletable.
Read more
Recent Comments