You might be interested in …

[ZDNet] Ransomware experts question massive Pysa/Mespinoza victim dump

All posts, ZDNet

The prolific ransomware group dumped more than 50 victim names onto its leak site this week. Source: Read More (Latest topics for ZDNet in Security)

Read More

[SecurityWeek] DeadRinger: A Three-Pronged Attack by Chinese Military Actors against Major Telcos

All posts, Security Week

Researchers have discovered three separate Chinese military affiliated advanced threat groups simultaneously targeting and compromising the same Southeast Asian telcos. The attack groups concerned are Soft Cell, Naikon, and a third group, possibly Emissary Panda (also known as APT27). read more Source: Read More (SecurityWeek RSS Feed)

Read More

[SANS ISC] Architecture, compilers and black magic, or “what else affects the ability of AVs to detect malicious files”, (Wed, Jun 9th)

All posts, Sans-ISC

In my last diary, we went over the impact of different Base encodings on the ability of anti-malware tools to detect malicious code[1]. Since results of our tests showed (among other things) that AV tools in general still struggle significantly more with detecting 64-bit malicious code then 32-bit malicious code, I thought it might be […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.