malware   12773

« earlier    

Cuckoo Sandbox - Automated Malware Analysis
Cuckoo Sandbox is an advanced, extremely modular, and 100% open source automated malware analysis system.
cuckoo  sandbox  malware  analysis  software  network  security 
3 days ago by vicchow
Researchers find exploit affecting Microsoft's BITS
“The poisoned BITS tasks, which created installation and clean-up scripts after their payloads were downloaded, were self-contained in the BITS job database, with no files or registry modifications to detect on the host,” a SecureWorks blog post stated.
Malware creators have previously used Microsoft's BITS to launch similar attacks by downloading malware updates, initially in May 2007 and most recently in December 2015.
malware  bits  windowsupdate  cybersecurity 
6 days ago by bwiese
“Malware-free” attacks mount in big breaches, CrowdStrike finds | Ars Technica
Not necessary to use malware/files if you can phish credentials then log in and use PowerShell. Hard to detect.
malware  hacking  security  PowerShell  phishing 
6 days ago by jcretan
NetworkTotal - Free Online Network Traffic Scanner
NetworkTotal is a online Network Traffic scanning service
pcap  analysis  malware 
7 days ago by doegox
TL;DR: Mailsploit is a collection of bugs in email clients that allow effective sender spoofing and code injection attacks. The spoofing is not detected by Mail Transfer Agents (MTA) aka email servers, therefore circumventing spoofing protection mechanisms such as DMARC (DKIM/SPF) or spam filters.
malware  email 
7 days ago by aiefel

« earlier    

related tags

#clouldflarte  #godaddy  &  /  (500)  (cambridge...  (  (  (plattsmouth  (with  -  00000  =  abuse  adult...  advanced  analysis  analyzer  and  android  antivirus  app  archive  automated  backdoor  bitcoin  bits  botnets  broadcom  broadpwn  browser  burger  caimbridge  cambridge  carr  check  checker  chip  cia  clickcman  clickman  cloud  cloudflare  code  computing  control  copyright  corporate  counterespionage  counterintelligence  cpp  cryptocurrency  ctf  cuckoo  cyber_security  cyber_warfare  cybercrime  cybersecurity  cybersecurityhttps  cyberwar  cyberweapons  data_breaches  david_sanger  ddos  defense  developer  digital  dns  docker  docs  does  domain  domains  don't  drm  edition  edition:  edward_snowden  eff  electric  email  encryption  encyclopedia  equation  espionage  exploits  exposed  fabrication  fedex  felony  fintech  framework  franchise...  franchise  free  from  go  godaddy  golang  google  gov2.0  hack  hacker  hackers  hacking  hardware  hijack  hit  holdings  hooking  how  http/s  hunting  hurricane  ibm  in  inc  information  infosec  intelligence  internet  ios  iot  isdp  it?  it  jm  kaspersky  keeps  king  lasc  launderers  leave  leon_panetta  life  linux  list  llc  mac  machinelearning  macos  madebygoogle  marketing  me  mobile  moles  mondelez  monetizing  money  monitoring  my  ne)  network  notes)  nsa  object  ohforfuckssake  on  oneplus3t  online  organization  osx  pcap  pentesting  phishing  pinterest  poisened  powershell  privacy  protected  pwned  ransomeware  ransomware  rat  reference  reporting  research  reverse-engineering  reverseengineering  reviews  root  rootkit  rootkits:  ruin  russia  sample  samples  sandbox  scanner  scum  second  secrets  security  security_&_intelligence  seguridad  sem  seo  service  shadow_brokers  shell  shiny  slides  software  solutions  source  spam  sudduth  sudduth”  tell  test  tester  threat-research  threat_actors  to  tools  toread  training  trojan  truffe  trustedcomputing  twitter  unix  unpacked  untitled  url  utility  video  vimeo  virus  vulnerabilities  w3c  webapp  what  why  wifi  wikileaks  windows  windowsupdate  wordwide  would  wth  you  zeuspanda  |      “robert 

Copy this bookmark: