DATE | | NAME | Info | CATEG. | WEB |
14.1.24 | | Financial Fraud APK Campaign | During our research discovering threats in legitimate network traffic, activity generated by a certain type of Android Package Kit (APK) files kept hitting our radar. This activity led us to conduct an in-depth investigation on the associated APK files. | | Palo Alto |
14.1.24 | | Medusa Ransomware Turning Your Files into Stone | Unit 42 Threat Intelligence analysts have noticed an escalation in Medusa ransomware activities and a shift in tactics toward extortion, characterized by the introduction in early 2023 of their dedicated leak site called the Medusa Blog. | | Palo Alto |
14.1.24 | | Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer | Malware, like many complex software systems, relies on the concept of software configuration. Configurations establish guidelines for malware behavior and they are a common feature among the various malware families we examine. | | Palo Alto |
14.1.24 | | .NET HOOKING – HARMONIZING MANAGED TERRITORY | For a malware researcher, analyst, or reverse engineer, the ability to alter the functionality of certain parts of code is a crucial step, often necessary to reach a meaningful result during the analysis process. | | Checkpoint |
14.1.24 | | New decryptor for Babuk Tortilla ransomware variant released | Cisco Talos obtained executable code capable of decrypting files affected by the Babuk Tortilla ransomware variant, allowing Talos to extract and share the private decryption key used by the threat actor. | | Cisco Blog |
14.1.24 | | Lessons from SEC's X account hack – Week in security with Tony Anscombe | The cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC's X account right ahead of the much-anticipated decision about Bitcoin ETFs | | Eset |
14.1.24 | | A peek behind the curtain: How are sock puppet accounts used in OSINT? | How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks | | Eset |
14.1.24 | | Attack of the copycats: How fake messaging apps and app mods could bite you | WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don’t get taken for a ride. | | Eset |
14.1.24 | | Love is in the AI: Finding love online takes on a whole new meaning | Is AI companionship the future of not-so-human connection – and even the cure for loneliness? | | Eset |
14.1.24 | | Cracking the 2023 SANS Holiday Hack Challenge | From ChatNPT to Game Boys and space apps, this year’s challenge took us to the Geese Islands for another rollicking romp of fun | | Eset |
14.1.24 | | Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe | What are some of the key cybersecurity trends that people and organizations should have on their radars this year? | | Eset |
14.1.24 | | Lost and found: How to locate your missing devices and more | Losing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracy | | Eset |
14.1.24 | | Say what you will? Your favorite speech-to-text app may be a privacy risk | Typing with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets. | | Eset |