The Latest in IT Security

Stealthy Malware Leaves No File on the System

03
Sep
2014

A new cyber attack has been spotted to be launched by Angler exploit kit, with memory-residing malware that creates no file on the victims computer.The threat is delivered via a drive-by download and the code is injected straight into the web browser process, leaving no trace of the infection.French Malware researcher Kafeine discovered that the new malware is not picked up by his regular security solutions and evaded detection of a host-based intrusion prevention system (HIPS) he relie…

Comments are closed.

Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments