More than 20 vulnerabilities have been identified by Cisco’s Talos research and threat intelligence unit in a Lantronix Wi-Fi module designed for critical industrial and commercial applications.
Source: Read More (SecurityWeek RSS Feed)
Techniques: Current Use of Virtual Machine Detection Methods www.gdatasoftware.com/blog/2020/05/36068-current-use-of-virtual-machine-detection-methods A common approach to analyse potentially malicious software is dynamic analysis in a virtual machine. Therefore, malware authors use techniques to alter the malware’s behavior when being run in a VM. But how do they actually do it? Meant to Combat ID Theft, Unemployment Benefits Letter […]
What does the increasingly fuzzy line between traditional cybercrime and attacks attributed to state-backed groups mean for the future of the threat landscape? The post State‑sponsored or financially motivated: Is there any difference anymore? appeared first on WeLiveSecurity Source: Read More (WeLiveSecurity)
Microsoft’s security team said today that it uncovered a massive operation that provides phishing services to cybercrime gangs using a hosting-like infrastructure that the OS maker likened to a Phishing-as-a-Service (PHaaS) model. Known as BulletProofLink, BulletProftLink, or Anthrax, the service is currently advertised on underground cybercrime forums. The service is an evolution on “phishing kits,” which […]