Sicurezza

Accessing Your Crypto Wallet Through Android Devices?

Pubblicato il

Android platforms are commonly characterized by the presence of Trojan-infected apps that have built-in cryptocurrency mining codes, which means that mobile users are highly susceptible to malicious cryptocurrency mining attacks. It is quite alarming to note that cyber criminals deploy malicious APKs that are delivered through SMS spam and cryptocurrency miners into people’s mobile devices […]

Sicurezza

Personal Security Hygiene

Pubblicato il

If you are reading this post, chances are you are aware of internet hacks – you have heard of the company that got all its data stolen, or the CEO whose social media account was compromised. If you work at an enterprise, it’s likely that your enterprise bought and deployed some security products to protect […]

Sicurezza

The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners

Pubblicato il

In my last article, I was discussing how malicious cryptocurrency mining is all set to exploit technological as well as human vulnerabilities this year. In this article, I will continue digging deeper and discuss its patterns of invasions. As people keep talking about how cybercriminals used the banking Trojan Trickbot to steal Coinbase users’ credentials, […]

Sicurezza

Detecting Malware/APT Through Automatic Log Analysis

Pubblicato il

Legacy perimeter security mechanisms can be evaded very easily. It’s disappointing, but it’s true. Innovatively-designed malware and APTs have the potential to evade even the strongest signature-based security solutions that are currently being deployed across industries. This has encouraged IT companies to think beyond prevention and to design effective detection strategies. In recent times, companies […]

Sicurezza

Nigelthorn Malware Abuses Chrome Extensions to Cryptomine and Steal Data

Pubblicato il

Individual research contributed by Adi Raff and Yuval Shapira. On May 3, 2018, Radware’s malware protection service detected a zero-day malware threat at one of its customers, a global manufacturing firm, by using machine-learning algorithms. This malware campaign is propagating via socially-engineered links on Facebook and is infecting users by abusing a Google Chrome extension […]

Sicurezza

Stresspaint Malware Campaign Targeting Facebook Credentials

Pubblicato il

On April 12, 2018, Radware’s threat research group detected malicious activity via internal feeds of a group collecting user credentials and payment methods from Facebook users across the globe. The group manipulates victims via phishing emails to download a painting application called ‘Relieve Stress Paint.’ While benign in appearance, it runs a malware dubbed ‘Stresspaint’ […]

Sicurezza

The Evolution of a Threat Intelligence Feed

Pubblicato il

I do declare, I do not know; if this guest be friend or foe… Wouldn’t it be nice to be able to turn away malicious network guests before they create havoc and bring all their evil friends to visit your applications, without having to worry about blocking legitimate guests from access to your applications? The […]

Sicurezza

You Need a New Approach to Stop Evasive Malware

Pubblicato il

Evasive malware has become a key threat to businesses’ sensitive data. Stealing and selling sensitive data on the Darknet is a lucrative business for hackers, who increasingly rely on evasive malware to penetrate corporate networks. A study by Verizon found that over 50% of data breaches involve the usage of malware in some capacity. Indeed, […]

Sicurezza

JenX – Los Calvos de San Calvicie

Pubblicato il

Source: sancalvicie.com A new botnet recently started recruiting IoT devices. The botnet uses hosted servers to find and infect new victims leveraging one of two known vulnerabilities that have become popular in IoT botnets recently: Both exploit vectors are known from the Satori botnet and based on code that was part of a recent public […]