The Latest in IT Security

Posts Tagged ‘iteration’

The Websense® ThreatSeeker® Network discovered on June 27, 2012, that one of the most popular travel websites in India, cleartrip.com, was compromised and served malicious code. The website was informed of this breach and no longer serves malicious code.   In this blog, we'd like to share our insights about this attack and focus on the tactics that we […]

Read more ...

The following IPs are related to the TDL/TDSS rootkit. 212.36.9.52 / gic-kbmtu0zkvwylf.com appears to be a C&C server. 94.63.149.10 94.63.149.11 94.63.149.12 94.63.149.13 94.63.149.14 94.63.149.15 146.185.250.140 146.185.250.141 195.3.145.251 195.3.145.252 195.3.145.253 212.36.9.52 94.63.149.0/24 is a Romanian host called Eurolan Solutions SRL, I’ve had this blocked for months with no ill-effects. 146.185.0.0/16 is Petersburg Internet Network Ltd in […]

Read more ...

Recently while I was analyzing a bunch of samples packed by custom packers, one of them struck me as a bit different than any others I saw before. At first glance, the outer layer of packing is a UPX stub, which is commonly used in malware. Especially when combined with a custom packer, UPX can […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments