An In Depth Look At APT DeathStalker

0
By Ivan Kwiatkowski, Pierre Delcher, Maher Yamout on August 24, 2020. 10:00 am State-sponsored threat actors and sophisticated attacks are often in the spotlight. Indeed, their innovative techniques, advanced malware platforms and 0-day exploit chains...

This Chat is Being Recorded: Egregor Ransomware Negotiations Uncovered

July 21, 2021 | By Chris Caridi co-authored by Allison Wikoff | 8 min read Ransomware attacks are topping the charts as the most common attack type to target organizations with a constant drumbeat of attacks impacting industries...

Rare UEFI Malware Found in the wild Kaspersky says

0
By Mark Lechtik, Igor Kuznetsov, Yury Parshin  Part II. Technical details (PDF) UEFI (or Unified Extensible Firmware Interface) has become a prominent technology that is embedded within designated chips on modern day computer systems....

Chinese government hackers attack Russian companies for the first time

0
The hacker group APT31, known for numerous attacks on government agencies in different countries, attacked Russian companies for the first time. According to Positive Technologies, in the first half...

IcedID Malware Updates new techniques To Avoid Detection

0
by Paul Kimayong In our previous blog about IcedID, we  explored some of the changes in the malware and how it tries to evade detection. We also detailed how threat actors took advantage...

The Evil Corp Groups New Ransomware WastedLocker

New Ransomware Developed By Evil Corp Attempts To Bypass Crowdstrike and is encrypted by a private crypter. Stefano Antenucci June 23, 2020 22 Minutes Authors: Nikolaos Pantazopoulos, Stefano Antenucci (@Antelox) and Michael Sandee 1. Introduction WastedLocker is a new ransomware...

A New RAT That is Controlled Via HTTP Status Commands

A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control compromised systems targeted in a recent campaign...
Error decoding the Instagram API json