Sicurezza

Detecting Malware/APT Through Automatic Log Analysis

Pubblicato il

Legacy perimeter security mechanisms can be evaded very easily. It’s disappointing, but it’s true. Innovatively-designed malware and APTs have the potential to evade even the strongest signature-based security solutions that are currently being deployed across industries. This has encouraged IT companies to think beyond prevention and to design effective detection strategies. In recent times, companies […]

Sicurezza

Nigelthorn Malware Abuses Chrome Extensions to Cryptomine and Steal Data

Pubblicato il

Individual research contributed by Adi Raff and Yuval Shapira. On May 3, 2018, Radware’s malware protection service detected a zero-day malware threat at one of its customers, a global manufacturing firm, by using machine-learning algorithms. This malware campaign is propagating via socially-engineered links on Facebook and is infecting users by abusing a Google Chrome extension […]

Sicurezza

Stresspaint Malware Campaign Targeting Facebook Credentials

Pubblicato il

On April 12, 2018, Radware’s threat research group detected malicious activity via internal feeds of a group collecting user credentials and payment methods from Facebook users across the globe. The group manipulates victims via phishing emails to download a painting application called ‘Relieve Stress Paint.’ While benign in appearance, it runs a malware dubbed ‘Stresspaint’ […]

Sicurezza

The Evolution of a Threat Intelligence Feed

Pubblicato il

I do declare, I do not know; if this guest be friend or foe… Wouldn’t it be nice to be able to turn away malicious network guests before they create havoc and bring all their evil friends to visit your applications, without having to worry about blocking legitimate guests from access to your applications? The […]

Sicurezza

You Need a New Approach to Stop Evasive Malware

Pubblicato il

Evasive malware has become a key threat to businesses’ sensitive data. Stealing and selling sensitive data on the Darknet is a lucrative business for hackers, who increasingly rely on evasive malware to penetrate corporate networks. A study by Verizon found that over 50% of data breaches involve the usage of malware in some capacity. Indeed, […]

Sicurezza

JenX – Los Calvos de San Calvicie

Pubblicato il

Source: sancalvicie.com A new botnet recently started recruiting IoT devices. The botnet uses hosted servers to find and infect new victims leveraging one of two known vulnerabilities that have become popular in IoT botnets recently: Both exploit vectors are known from the Satori botnet and based on code that was part of a recent public […]

Sicurezza

Security News This Week: Hoo-Boy, Mar-a-Lago’s Internet Is Insecure

Pubblicato il

For anyone growing weary of the constant focus on Russian and President Donald Trump’s campaign, good news! A fresh horror took the spotlight late last week in the form of WannaCry, a vicious ransomware whose creators appear not to have been all that smart. WannaCry, we learned, features a built-in “kill switch” that security researchers […]

Sicurezza

Hackers Are Trying to Reignite WannaCry With Nonstop Botnet Attacks

Pubblicato il

Over the past year, two digital disasters have rocked the internet. The botnet known as Mirai knocked a swath of major sites off the web last September, including Spotify, Reddit, and The New York Times. And over the past week, the WannaCry ransomware outbreak crippled systems ranging from health care to transportation in 150 countries […]

Sicurezza

The WannaCry Ransomware Has a Link to Suspected North Korean Hackers

Pubblicato il

As the WannaCry ransomware epidemic wreaked havoc across the globe over the past three days, cybersecurity researchers and victims alike have asked themselves what cybercriminal group would paralyze so many critical systems for such relatively small profit? Some researchers are now starting to point to the first, still-tenuous hint of a familiar suspect: North Korea. […]