HackDig : Dig high-quality web security articles for hackers

A Cybersecurity Proof: The Application is the Endpoint

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How m
Publish At:2017-10-21 16:25 | Read:5177 | Comments:0 | Tags:Threats access points application attack vector endpoint End

Signatures Not the Root of Prevention

Faulty file definitions strike once again! On April 24, anti-virus provider Webroot issued an automated update to its signature definitions. This inadvertently quarantined hundreds of critical customer files and applications that it erroneously flagged as malicious. At one time or another, it seems that every anti-malware endpoint security provider has fal
Publish At:2017-05-13 12:35 | Read:4103 | Comments:0 | Tags:Breaking News anti-virus file-based updates Isolation malici

Stop the Most Advanced Adversaries

Imagine that you are operating on an old XP, Win98 or Windows Server 2003 system. The system is out-of-support and vulnerable to a raft of possible exploits.However, it would be too disruptive to operations to update these systems since they’re running critical applications and processes. And even if you do upgrade to the latest versions, the list of new exp
Publish At:2017-03-22 03:20 | Read:7892 | Comments:0 | Tags:Featured Articles Off Topic Insider malicious security

Ransom32 – look at the malicious package

Ransom32 is a new ransomware implemented in a very atypical style. Emisoft provides a good description of its functionality here. In our post, we will focus on some implementation details of the malicious package. Analyzed sample:  09f21eefaf8f52496d4e8b06920fe6fa Overview Ransom32 is delivered as an executable, that is in reality a autoextracting WinRAR ar
Publish At:2016-01-11 21:10 | Read:5393 | Comments:0 | Tags:Malware Analysis malicious Ransom32 ransomware unpack

We analyze Cryptobot, aka Paycrypt

Recently during some research on encrypting ransomware we came across a new variant that brings some new features to the table. It will encrypt by utilizing the following javascript from being opened as an attachment from email (posing as some document file). Malicious script from email   Once full encrypted you’ll get a popup text document inform
Publish At:2014-11-07 22:35 | Read:4530 | Comments:0 | Tags:Blog Exploits Threat Research cryptobot cryptolocker malicio


Tag Cloud