The Latest in IT Security

Posts Tagged ‘decrypted data’

We continue to analyse the Shamoon malware. This blog contains information about the internals of the malicious samples involved in this campaign. Samples nesting The main executable (dropper) includes 3 resources, each maintains a ciphered program. The cipher is pretty simple ? xor by dword. This was mentioned in our first blog-post. Resource PKCS12:112 maintains […]

Read more ...

On June 14, Adobe released updates and a security bulletin (APSB11-18) referencing attacks affecting Adobe Flash Player (versions and earlier). These attacks have been observed as hosted on webpages containing malformed SWF files. We spent some time analyzing this Flash Player vulnerability (described in CVE-2011-2110) and are providing some technical details of this in-the-wild […]

Read more ...

The current wave of Mac OS X FakeAV infection follows a three-step process. To those familiar with Windows-based FakeAV, the pattern in this infection chain is quite familiar. Displays a “scanning page” from poisoned Google searches Prompts a download of a .ZIP which contains a .PKG installer. This installer installs a downloader. The downloader downloads […]

Read more ...


MONDAY, MAY 25, 2020

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments