A number of malicious samples have been created for the Windows Subsystem for Linux (WSL) with the goal of compromising Windows machines,...
According to researchers, cybercriminals are abusing legitimate challenge and response services like Google’s reCAPTCHA or deploying customized fake CAPTCHA-like validation. Palo Alto...
Cybersecurity researchers of FireEye’s Mandiant Advanced Practices team have revealed all the details regarding a new malware family that they have detected...
Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every...
Cybersecurity researchers on Tuesday lifted the lid on a previously undocumented malware strain dubbed “MosaicLoader” that singles out individuals searching for cracked...
It’s natural to get complacent with the status quo when things seem to be working. The familiar is comfortable, and even if...
Bolstering password policies in your organization is an important part of a robust cybersecurity strategy. Cybercriminals are using compromised accounts as one...
Researchers on Tuesday disclosed a novel malware that uses a variety of tricks to stay under the radar and evade detection, while...
ByteDance-HIDS is a Cloud-Native Host-Based Intrusion Detection solution project to provide next-generation Threat Detection and Behavior Audition with modern architecture. ByteDance-HIDS...
The specialized team FireEye Email Security has published a report on the detection of multiple phishing campaigns in which operators use source...
Recently one of the most dangerous ransomware, WastedLocker, owes its success to a unique bypass mechanism for security solutions and tools that...
A prolific phishing kit distribution network dubbed “16Shop” believed to be active since 2018 and developed by a hacking group called the...
Attack Monitor is Python application written to enhance security monitoring capabilites of Windows 7/2008 (and all later versions) workstations/servers and to automate...
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from...
DetectionLab is tested weekly on Saturdays via a scheduled CircleCI workflow to ensure that builds are passing. PurposeThis lab has been designed...
Sigma Hunting App A Splunk App containing Sigma detection rules, which can be updated dynamically from a Git repository. Motivation Most of...
This is an hybrid solution combining a flexible Host IDS with detection based Incident Response capabilities. The detection engine is built on...
These files contain configuration for producing EDR (endpoint detection and response) data in addition to standard system logs. These configurations enable...
Researchers discovered 2 new hacking tools called BOOSTWRITE and RDFSNIFFER that were added in FIN7 groups malware arsenal with sophisticated capabilities and...
MasterMana botnet is part of an ongoing malware campaign. The IT security researchers at Prevailion have discovered an active botnet that has...
Grapl is an open source platform for Detection and Response (D&R). The position that Grapl takes is that Graphs provide a...