Tag: malware

  • Microsoft Security Blog: Malvertising campaign leads to info stealers hosted on GitHub

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/06/malvertising-campaign-leads-to-info-stealers-hosted-on-github/ Source: Microsoft Security Blog Title: Malvertising campaign leads to info stealers hosted on GitHub Feedly Summary: Microsoft detected a large-scale malvertising campaign in early December 2024 that impacted nearly one million devices globally. The attack originated from illegal streaming websites embedded with malvertising redirectors and ultimately redirected users to GitHub to deliver…

  • Hacker News: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/gostringungarbler-deobfuscating-strings-in-garbled-binaries Source: Hacker News Title: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries Feedly Summary: Comments AI Summary and Description: Yes Summary: This text details the challenges associated with analyzing malware written in Go that utilizes the garble obfuscator, focusing on the introduction of the GoStringUngarbler tool, which automates the deobfuscation process of string literals.…

  • Unit 42: The Next Level: Typo DGAs Used in Malicious Redirection Chains

    Source URL: https://unit42.paloaltonetworks.com/?p=138551 Source: Unit 42 Title: The Next Level: Typo DGAs Used in Malicious Redirection Chains Feedly Summary: A graph intelligence-based pipeline and WHOIS data are among the tools we used to identify this campaign, which introduced a variant of domain generation algorithms. The post The Next Level: Typo DGAs Used in Malicious Redirection…

  • Cloud Blog: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/gostringungarbler-deobfuscating-strings-in-garbled-binaries/ Source: Cloud Blog Title: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries Feedly Summary: Written by: Chuong Dong Overview In our day-to-day work, the FLARE team often encounters malware written in Go that is protected using garble. While recent advancements in Go analysis from tools like IDA Pro have simplified the analysis process, garble…

  • Anchore: NIST SP 800-190: Overview & Compliance Checklist

    Source URL: https://anchore.com/blog/nist-sp-800-190-overview-compliance-checklist/ Source: Anchore Title: NIST SP 800-190: Overview & Compliance Checklist Feedly Summary: This blog post has been archived and replaced by the supporting pillar page that can be found here: https://anchore.com/wp-admin/post.php?post=987474946&action=edit The blog post is meant to remain “public” so that it will continue to show on the /blog feed. This will…

  • Hacker News: Google’s Unannounced Update Scans All Your Photos

    Source URL: https://www.forbes.com/sites/zakdoffman/2025/02/28/google-starts-scanning-your-photos-without-any-warning/ Source: Hacker News Title: Google’s Unannounced Update Scans All Your Photos Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the controversy surrounding Google’s SafetyCore application, which was silently installed on Android devices and is capable of scanning user photos for sensitive content. It parallels similar concerns raised with…

  • Wired: 1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers

    Source URL: https://www.wired.com/story/1-million-third-party-android-devices-badbox-2/ Source: Wired Title: 1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers Feedly Summary: New research shows at least a million inexpensive Android devices—from TV streaming boxes to car infotainment systems—are compromised to allow bad actors to commit ad fraud and other cybercrime. AI Summary and Description: Yes Summary: The…

  • The Register: Cybercrims now licking stamps and sending extortion demands in snail mail

    Source URL: https://www.theregister.com/2025/03/05/snail_mail_data_release_extortion/ Source: The Register Title: Cybercrims now licking stamps and sending extortion demands in snail mail Feedly Summary: First crooks gave up encrypting data, and just stole it – now they don’t even bother pilfering info. Sheesh! Ransomware extortionists are now using letters sent by snail mail to demand payments, without bothering to…

  • Microsoft Security Blog: Securing generative AI models on Azure AI Foundry

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/04/securing-generative-ai-models-on-azure-ai-foundry/ Source: Microsoft Security Blog Title: Securing generative AI models on Azure AI Foundry Feedly Summary: Discover how Microsoft secures AI models on Azure AI Foundry, ensuring robust security and trustworthy deployments for your AI systems. The post Securing generative AI models on Azure AI Foundry appeared first on Microsoft Security Blog. AI…