CVE-2015-2545: overview of current threats
...SP1. The error enables an attacker to execute arbitrary code using a specially crafted EPS image file. The exploit uses PostScript and can evade Address Space Layout Randomization (ASLR) and... more…Website Cross-contamination: Blackhat SEO Spam Malware
...footбаl spаcе 240 320 prince of persia game free download on phonky Prince of persia for nokia 216 jad file Nokia 216 vxp games Nokia 216 phonky java 20kb raceing... more…SYSCON Backdoor Uses FTP as a C&C Channel
...same threat actor. Decoding each Base64 string results in a cabinet file. One string contains a 32-bit version of the malware; the other contains a 64-bit version. The appropriate version... more…Unfolding the Mystery of Cerber Ransomware’s Random File Extension
...(.caz) that contains code to decrypt the Cerber file. A component of NSIS follows: The file .ch is the encrypted Cerber file. The first DWORD of the file is the... more…The Ventir Trojan: assemble your MacOS spy
...We got an interesting file (MD5 9283c61f8cce4258c8111aaf098d21ee) for analysis a short while ago. It turned out to be a sample of modular malware for MacOS X. Even after preliminary... more…Janus Android App Signature Bypass Allows Attackers to Modify Legitimate Apps
...other apps and access the information of the user. Vulnerability analysis The installation packages of Android apps (.APK files) are actually .ZIP files. The .ZIP file format has several characteristics... more…Backdoor-carrying Emails Set Sights on Russian-speaking Businesses
...dynamic-link library (DLL) file related to these attacks was uploaded to VirusTotal last June 6, 2017. This somewhat coincides with the spate of emails we saw during the period between... more…McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups
...the implants described in our analysis. Technical Analysis Let’s start with an overview of the attack: We continue with the components involved in this operation. The malicious Word file is... more…Polyglot – the fake CTB-locker
...infected file is launched, nothing appears to happen. However, the cryptor copies itself under random names to a dozen or so places, writes itself to the autostart folder and to... more…Tinymce PHP file Manager, Remote File upload vulnrablity
...Title :Tinymce PHP file Manager, Remote File upload vulnrablity server : LinuxAuthor: NoentryPHC Type : webapp Exploit Hamr : remote shell upload Dork : inurl:/file_manager.php?type=img Goto google.com and type... more…ChessMaster Adds Updated Tools to Its Arsenal
...an email with an attached malicious document using the doc, docx, rtf, csv and msg formats. The email title and attached file name were written in Japanese and contain general... more…Facebook malware: tag me if you can
...worldwide. The first stage of the attack started when the user clicked on the “mention”. A malicious file seized control of their browsers, terminating their legitimate browser session and replacing... more…A malicious pairing of cryptor and stealer
...there: some versions of RAA also include a Pony Trojan file, which steals confidential information from the infected computer. Using the stolen data, the cybercriminals can gain access to the... more…Timeline of Sandworm Attacks
...attacker can control two external variables to invoke different paths inside the affected component package.dll. The variables are: OLE Verbs and Embedded File Type. Vulnerability time cycle Looking at the... more…Spora Ransomware Infects ‘Offline’—Without Talking to Control Server
...spam campaign. It has a very special feature—to work offline. Propagation vector The spam campaign carries a .zip file, which contains an HTA (HTML Application) file to evade detection from... more…BE2 Custom Plugins, Router Abuse, and Target Profiles
...strangeness was related to values listed in newer BlackEnergy configuration files. As described in Dmitry’s 2010 Black DDoS’ analysis, a configuration file is downloaded from the server by main.dll on an infected... more…Kam dál?
- Hacked Smart Fish Tank Exfiltrated Data to ‘Rare External Destination’
- Yahoo Paid Out $2 Million in Bug Bounty Program
- Resolved: Wireless controller software upgrade
- 3D printing pirates: When eBay thieves profit from your work
- UK government sets up cyber security fusion cell
- Supercomputers give a glimpse of cybersecurity’s automated future
- US Lawmakers Seek Answers on Yahoo Email Scanning
- How I became a password cracker
- Mt. Gox CEO lied about massive Bitcoin theft, according to alleged hackers
- Kickstarter breached – change your passwords