You might be interested in …

[ZDNet] Crackonosh malware abuses Windows Safe mode to quietly mine for cryptocurrency

All posts, ZDNet

The malware is thought to have generated millions of dollars in just a few short years. Source: Read More (Latest topics for ZDNet in Security)

Read More

[SecurityWeek] Measuring Cybersecurity Training Effectiveness

All posts, Security Week

As your organization reviews the training program, you could start to identify processes that are broken read more Source: Read More (SecurityWeek RSS Feed)

Read More

[SANS ISC] All your Base are…nearly equal when it comes to AV evasion, but 64-bit executables are not, (Thu, May 27th)

All posts, Sans-ISC

Malware authors like to use a variety of techniques to avoid detection of their creations by anti-malware tools. As the old saying goes, necessity is the mother of invention and in the case of malware, it has lead its authors to devise some very interesting ways to hide from detection over the years – from […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.