Tag: Detection
-
Communication is Key – Leveraging Business Frameworks to Develop a Detection and Response Strategy
Operating a business within the modern threat landscape can often appear like an impossible task. With a constant stream of new …
-
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
Select Ukrainian government networks have remained infected with a malware called OfflRouter since 2015. Cisco Talos said its findings are …
-
SoumniBot Exploiting Android Manifest Flaws to Evade Detection
A new banker, SoumniBot, has recently been identified. It targets Korean users and is incredible by using an unusual method to evade …
-
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
A new Android trojan called SoumniBot has been detected in the wild targeting users in South Korea by leveraging weaknesses in the manifest …
-
SharePoint Flaws Could Help Threat Actors Evade Detection Easier When Stealing Files
Two methods that researchers have found might allow attackers to get around audit logs or produce less serious entries when they download …
-
XZ Utils backdoor: Detection tools, scripts, rules
As the analysis of the backdoor in XZ Utils continues, several security companies have provided tools and advice on how to detect its …
-
Real Time Exposure Detection Is the Missing Element of Every Cybersecurity Strategy
Detecting threats and vulnerabilities in real-time is crucial for an effective cybersecurity strategy to protect against cybercriminals. By …
-
Linux Variants of Bifrost Trojan Evade Detection via Typosquatting
“A 20-year-old Trojan resurfaced recently,” reports Dark Reading, “with new variants that target Linux and impersonate a trusted hosted …
-
South Korean Police Develops Deepfake Detection Tool Ahead of April Elections
Read more on deepfake policy changes ahead of the 2024 elections: OpenAI Announces Plans to Combat Misinformation Amid 2024 Elections …
-
New HijackLoader Malware Uses Advanced Techniques to Avoid Detection
Threat actors exploit HijackLoader because it is a powerful tool for injecting malicious code into legitimate processes, enabling stealthy …
-
Glupteba Botnet Evades Detection with Undocumented UEFI Bootkit
The Glupteba botnet has been found to incorporate a previously undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature, …
●●●