Blog

  1. Home
  2. /
  3. Blog
Malvertising campaign leads to info stealers hosted on GitHub | Microsoft Security Blog

Malvertising campaign leads to info stealers hosted on GitHub | Microsoft Security Blog

A comprehensive analysis of a new malvertising campaign that leads to info stealers hosted on GitHub, highlighting the tactics used by attackers and providing actionable recommendations for mitigation.

March 7, 2025
0 Comments
Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered

Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered

The latest threat report from AlienVault reveals new evasion tactics used by Remcos RAT to target European institutions. Learn about the updated infection chain, its implications, and recommendations for mitigation.

March 6, 2025
0 Comments
Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered

Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered

The SonicWall threat research team has uncovered a new update in the Remcos infection chain, enhancing its stealth by patching AMSI scanning and ETW logging to evade detection. This variant targets European institutions and includes recommendations for mitigation.

March 5, 2025
0 Comments
Deep Dive Into Allegedly AI-Generated FunkSec Ransomware

Deep Dive Into Allegedly AI-Generated FunkSec Ransomware

A new Rust-based ransomware called FunkSec has emerged, claiming to use artificial intelligence in its development. This threat report provides an overview of its capabilities, behaviors, and recommendations for mitigation.

March 4, 2025
0 Comments
Uncovering .NET Malware Obfuscated by Encryption and Virtualization

Uncovering .NET Malware Obfuscated by Encryption and Virtualization

This article examines advanced obfuscation techniques used in popular malware families like Agent Tesla, XWorm, and FormBook/XLoader. The techniques include code virtualization, staged payload delivery, dynamic code loading, AES encryption, and multi-stage payloads.

March 4, 2025
0 Comments
New Cyber Threats: A Comprehensive Analysis and Recommendations

New Cyber Threats: A Comprehensive Analysis and Recommendations

A detailed analysis of new cyber threats, their TTPs, and comprehensive recommendations for mitigation.

March 4, 2025
0 Comments
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks

PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks

The latest threat report by CyberHunter_NL reveals links between PROSPERO (AS200593) and Proton66 (AS198953), highlighting their connection to bulletproof hosting services. Learn about the implications for cybersecurity and recommendations for mitigation.

March 3, 2025
0 Comments
Global Ransomware Attacks in 2024: Stats and Analysis

Global Ransomware Attacks in 2024: Stats and Analysis

  Executive Summary This report provides an overview of the global ransomware landscape in 2024, focusing on attack trends, major

March 1, 2025
0 Comments

Share this:

Like this:

Like Loading...