Tag: Malware Technologies
-
Scam Information and Event Management
Malicious actors are spreading miners through fake websites with popular software, Telegram channels and YouTube, installing Wazuh SIEM …
-
Network tunneling with… QEMU?
While investigating an incident, we detected uncommon malicious activity inside one of the systems. We ran an analysis on the artifacts, …
-
Operation Triangulation: The last (hardware) mystery
Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to …
-
Windows CLFS and five exploits used by ransomware operators (Exploit #5 – CVE-2023-28252
This is part six of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been …
-
Windows CLFS and five exploits used by ransomware operators (Exploit #1 – CVE-2022-2
This is the second part of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that …
-
Windows CLFS and five exploits used by ransomware operators
We had never seen so many CLFS driver exploits being used in active attacks before, and then suddenly there are so many of them captured in …
-
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September
This is the third part of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have …
-
Windows CLFS and five exploits used by ransomware operators (Exploit #3 – October 2022)
This is part four of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been …
-
Windows CLFS and five exploits used by ransomware operators (Exploit #4 – CVE-2023-23376
This is part five of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been …
-
Story of the year: the impact of AI on cybersecurity
Generative AI has become the trendiest technology of 2023. Kaspersky reviews AI-related security concerns, and implementations of this …
-
Not quite an Easter egg: a new family of Trojan subscribers on Google Play
The new Trojan family, Fleckpe, spreads via Google Play inside photo editors and wallpapers, subscribing the unaware user to paid …
-
Prilex modification now targeting contactless credit card transactions
Kaspersky discovers three new variants of the Prilex PoS malware capable of blocking contactless NFC transactions on an infected …
●●●