You might be interested in …

[HackerNews] Chinese Hackers Used a New Rootkit to Spy on Targeted Windows 10 Users

All posts, HackerNews

A formerly unknown Chinese-speaking threat actor has been linked to a long-standing evasive operation aimed at South East Asian targets as far back as July 2020 to deploy a kernel-mode rootkit on compromised Windows systems. Attacks mounted by the hacking group, dubbed GhostEmperor by Kaspersky, are also said to have used a “sophisticated multi-stage malware framework” that […]

Read More

[SANS ISC] All your Base are…nearly equal when it comes to AV evasion, but 64-bit executables are not, (Thu, May 27th)

All posts, Sans-ISC

Malware authors like to use a variety of techniques to avoid detection of their creations by anti-malware tools. As the old saying goes, necessity is the mother of invention and in the case of malware, it has lead its authors to devise some very interesting ways to hide from detection over the years – from […]

Read More

[NCSC-NL] NCSC-NL publishes factsheet PKIoverheid is changing: Coordinate the necessary changes in your ICT processes

All posts

In the coming months, changes will take place in the PKIoverheid system, in order to resolve an issue that was discovered in July. In the meantime, the certificate issuers have started replacing PKIoverheid leaf certificates. Source: Read More (National Cyber Security Centre – News items)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.