You might be interested in …

[SANS ISC] Guildma is now using Finger and Signed Binary Proxy Execution to evade defenses, (Mon, May 31st)

All posts, Sans-ISC

  We recently identified a new Guildma/Astaroth campaign targeting South America, mainly Brazil, using a new variant of the malware. Guildma is known by its multiple-staged infection chain and evasion techniques to reach victim’s data and exfiltrate them. In a previous diary [1] at Morphus Labs, we analyzed a Guildma variant which employed an innovative […]

Read More

[ThreatPost] How to Defend Against Mobile App Impersonation

All posts, ThreatPost

Despite tight security measures by Google/Apple, cybercriminals still find ways to bypass fake app checks to plant malware on mobile devices. Dave Stewart, CEO of Approov, discusses technical approaches to defense against this. Source: Read More (Threatpost)

Read More

[BleepingComputer] Going beyond backup: Acronis True Image is now Acronis Cyber Protect Home Office

After nearly two decades, one of the most recognizable software brands is getting a new name. Acronis True Image, the leading personal cyber protection solution, is changing its name to Acronis Cyber Protect Home Office.  […] Source: Read More (BleepingComputer)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.