You might be interested in …

[HackerNews] Magecart Hackers Hide Stolen Credit Card Data Into Images for Evasive Exfiltration

All posts, HackerNews

Cybercrime actors part of the Magecart group have latched on to a new technique of obfuscating the malware code within comment blocks and encoding stolen credit card data into images and other files hosted on the server, once again demonstrating how the attackers are continuously improving their infection chains to escape detection. “One tactic that some Magecart actors employ […]

Read More

[SANS ISC] Network Forensics on Azure VMs (Part #1), (Thu, Jun 17th)

All posts, Sans-ISC

The tooling to investigate a potentially malicious event on an Azure Cloud VM is still in its infancy. We have covered before (Forensicating Azure VMs) how we can create a snapshot of the OS disk of a running VM. Snapshotting and then killing off the infected VM is very straight forward, but it also tips […]

Read More

[SecurityWeek] Mozilla Blocks Malicious Firefox Add-Ons Abusing Proxy API

All posts, Security Week

The open-source Mozilla Foundation says it blocked a series of malicious Firefox add-ons that misused the proxy API that extensions use to proxy web requests. The API allows add-ons to control the manner in which the browser connects to the Internet, and some extensions were found to abuse this. read more Source: Read More (SecurityWeek […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.