The Latest in IT Security

Posts Tagged ‘snapshots’

During the first half of the year, we have seen targeted attacks leveraging the Syrian conflict and how the backdoor RAT DarkComet was used, which we documented in the following blog posts: DarkComet Surfaced in the Targeted Attacks in Syrian Conflict Fake Skype Encryption Software Cloaks DarkComet Trojan After the report that the Anonymous collective […]

Read more ...

As we have mentioned before, we’ve seen a large number of files spammed out to various organisations, exploiting the CVE-2012-0158 vulnerability.Victims have not been limited to defence companies, but have also included government departments, charities and recruitment agencies.One of the latest attacks we have seen was sent to a defence contractor, using the subject line […]

Read more ...

Usage of commercial grade software protectors/cryptors/obfuscators is a very common trend in desktop malware landscape. They are mainly used to make the analyst’s life tough by adding extra layers of protection.  Similarly, there have been quite a few open source obfuscators and professional obfuscators used in the malware families implemented in Java as well for […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments