The Latest in IT Security

Posts Tagged ‘folders’

During our research on the Winnti group we discovered a considerable amount of Winnti samples targeting different gaming companies. Using this sophisticated malicious program cybercriminals gained remote access to infected workstations and then carried out further activity manually.Naturally, we were keen to find out how the malicious libraries spread across a local network. To do […]

Read more ...

It has been another month and we have found some more families that need some special attention that the Malicious Software Removal Tool (MSRT) is ideal to give. This month we are focused on cleaning up the Win32/Babonock, Win32/Redyms, and Win32/Vesenlosow families due to their recent increase in prevalence. Lately I have been working with […]

Read more ...

The popular Japanese word processor software Ichitaro is no stranger to threats, particularly exploits taking advantage of the software’s vulnerabilities. Since 2007, we have reported the malware targeting Ichitaro’s security flaws.This time, however, we uncovered an attack that employs an old trick that even Microsoft Office was previously vulnerable to (CVE-2011-1980). Typically, when an application […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments