Attackers Use Containers for Profit via TrafficStealer

Credit to Author: Alfredo Oliveira| Date: Wed, 26 Apr 2023 00:00:00 +0000

We found TrafficStealer abusing open container APIs in order to redirect traffic to specific websites and manipulate engagement with ads.

Read more

ViperSoftX Updates Encryption, Steals Data

Credit to Author: Don Ovid Ladores| Date: Mon, 24 Apr 2023 00:00:00 +0000

We observed cryptocurrency and information stealer ViperSoftX evading initial loader detection and making its lure more believable by making the initial package loader via cracks, keygens, activators, and packers non-malicious. We also noted more sophisticated encryption and basic anti-analysis techniques, such as byte remapping and web browser communication blocking.

Read more

Trend Achieves AWS Level 1 MSSP Competency Status

Credit to Author: Ashley Savoie| Date: Wed, 19 Apr 2023 00:00:00 +0000

Trend offers 24×7 fully managed security services uniquely designed in collaboration with AWS security experts to protect, monitor, and respond to security events of AWS environments.

Read more

Unpacking the Structure of Modern Cybercrime Organizations

Credit to Author: David Sancho| Date: Mon, 03 Apr 2023 00:00:00 +0000

We examine three differently sized criminal groups to know how they compare to similarly sized legitimate businesses in terms of how they are organized. We also discuss how threat researchers can use their knowledge of the size and structure of a target criminal organization to aid their investigation.

Read more

S4x23 Review Part 4: Cybersecurity for Industrial IoT

Credit to Author: Kazuhisa Tagaya| Date: Fri, 31 Mar 2023 00:00:00 +0000

In this fourth article, I introduce the discussion related to Industrial IoT, that is involved challenges to adopt cybersecurity strategy into modernizing environment.

Read more

Mac Malware MacStealer Spreads as Fake P2E Apps

Credit to Author: Qi Sun| Date: Thu, 30 Mar 2023 00:00:00 +0000

We detected Mac malware MacStealer spreading via websites, social media, and messaging platforms Twitter, Discord, and Telegram. Cybercriminals lure victims to download it by plagiarizing legitimate play-to-earn (P2E) apps’ images and offering jobs as beta testers.

Read more