BLOG 2024

APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog  2024  2023

DATE

NAME

Info

CATEG.

WEB

14.1.24

A pictorial representation of a financial fraud campaign. A male criminal with a beard and wearing a mask opens a door on a laptop screen.Financial Fraud APK CampaignDuring our research discovering threats in legitimate network traffic, activity generated by a certain type of Android Package Kit (APK) files kept hitting our radar. This activity led us to conduct an in-depth investigation on the associated APK files. Palo Alto

14.1.24

A pictorial representation of the Medusa ransomware gang. A hand offers money to another hand holding keys. In the background is a computer screen with the biohazard symbol on it.Medusa Ransomware Turning Your Files into StoneUnit 42 Threat Intelligence analysts have noticed an escalation in Medusa ransomware activities and a shift in tactics toward extortion, characterized by the introduction in early 2023 of their dedicated leak site called the Medusa Blog. Palo Alto

14.1.24

A pictorial representation of malware analyzed via configuration extractors. An open laptop against a dark background is flanked by exclamation points. On the laptop screen are overlapping windows with a bug icon representing the malware.Tackling Anti-Analysis Techniques of GuLoader and RedLine StealerMalware, like many complex software systems, relies on the concept of software configuration. Configurations establish guidelines for malware behavior and they are a common feature among the various malware families we examine.Palo Alto

14.1.24

.NET HOOKING – HARMONIZING MANAGED TERRITORYFor a malware researcher, analyst, or reverse engineer, the ability to alter the functionality of certain parts of code is a crucial step, often necessary to reach a meaningful result during the analysis process. Checkpoint

14.1.24

New decryptor for Babuk Tortilla ransomware variant releasedCisco Talos obtained executable code capable of decrypting files affected by the Babuk Tortilla ransomware variant, allowing Talos to extract and share the private decryption key used by the threat actor.Cisco Blog

14.1.24

Lessons from SEC's X account hack – Week in security with Tony AnscombeLessons from SEC's X account hack – Week in security with Tony AnscombeThe cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC's X account right ahead of the much-anticipated decision about Bitcoin ETFsEset

14.1.24

A peek behind the curtain: How are sock puppet accounts used in OSINT?A peek behind the curtain: How are sock puppet accounts used in OSINT?How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risksEset

14.1.24

Attack of the copycats: How fake messaging apps and app mods could bite youAttack of the copycats: How fake messaging apps and app mods could bite youWhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don’t get taken for a ride.Eset

14.1.24

Love is in the AI: Finding love online takes on a whole new meaningLove is in the AI: Finding love online takes on a whole new meaningIs AI companionship the future of not-so-human connection – and even the cure for loneliness?Eset

14.1.24

Cracking the 2023 SANS Holiday Hack ChallengeCracking the 2023 SANS Holiday Hack ChallengeFrom ChatNPT to Game Boys and space apps, this year’s challenge took us to the Geese Islands for another rollicking romp of funEset

14.1.24

Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony AnscombeCybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony AnscombeWhat are some of the key cybersecurity trends that people and organizations should have on their radars this year?Eset

14.1.24

Lost and found: How to locate your missing devices and moreLost and found: How to locate your missing devices and moreLosing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracyEset

14.1.24

Say what you will? Your favorite speech-to-text app may be a privacy riskSay what you will? Your favorite speech-to-text app may be a privacy riskTyping with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets.Eset