The Latest in IT Security

Posts Tagged ‘presence’

We can safely say that since we encountered our first rogue, they’ve always commanded a presence in the malware ecosystem. That was, until recently we observed a decrease in rogue activity. That’s not to say they went away altogether – no, not at all – but towards the end of January we did see markedly […]

Read more ...

Last week, we posted some detailed information about the actions that the March 20, 2013 MBR wiper attacks took against systems in South Korea.Today, I’d like to take that and some additional information that has come out about the incident and draw some conclusions about what lessons this attack teaches us.When we look at the […]

Read more ...

Yesterday the Iranian CERT made an announcement about a new piece of wiper-like malware. We detect these files as Trojan.Win32.Maya.a. This is an extremely simplistic attack. In essence, the attacker wrote some BAT files and then used a BAT2EXE tool to turn them into Windows PE files. The author seems to have used (a variant […]

Read more ...


Categories

SATURDAY, MAY 04, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments