The Latest in IT Security

Posts Tagged ‘Binaries’

As a follow up to yesterday’s Kumar in the Mac post… have you received e-mail attachments such as this? Attachments:   •  •  •  Content_of_article_for_[NAME REMOVED]  •  •  Lebenslauf_f? If so, you may be the target of a spear phishing campaign designed to install a spyware on your Mac. Here’s a list of binaries signed by Apple Developer “Rajinder Kumar”. Detected as […]

Read more ...

Since it has been a little while since we profiled a DDoS botnet family on the blog, let’s take a look at Trojan.BlackRev (also known as the “Black Revolution” trojan.) It was named for the Mutex set in early versions of the malware. This family is interesting from a research perspective because there are at […]

Read more ...

In the past few months, we have analyzed a targeted campaign that tries to steal sensitive information from different organizations throughout the world, but particularly in Pakistan. During the course of our investigations we uncovered several leads that indicate this threat has its origin in India and has been going on for at least two […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments