Jan 25, 2024NewsroomRemote Access Trojan Cybersecurity researchers have shed light on the command-and-control (C2) server of a known malware family called SystemBC. "SystemBC can be purchased on underground marketplaces and is supplied in an archive containing the implant, a command-and-control (C2) server, and a web administration portal written in PHP," Kroll said in an … [Read more...] about SystemBC Malware’s C2 Server Analysis Exposes Payload Delivery Tricks
analysis
Elastic Stack AIOps Labs 8.12: GA of log rate analysis
It’s been a huge team effort to bring this tool to life and finally to general availability. Several features available in Elasticsearch®’s search analytics engine were essential to make this possible:The p_value scoring heuristic for significant terms aggregation enables the identification of statistically significant field/value pairs within logs. This aggregation facilitates … [Read more...] about Elastic Stack AIOps Labs 8.12: GA of log rate analysis
November Patch Tuesday 2023: Updates and Analysis
Microsoft has released security updates for 58 vulnerabilities, including five zero-days, three of which are being actively exploited. One of the zero-days (CVE-2023-36025) is a Windows SmartScreen Security Feature Bypass Vulnerability, the second (CVE-2023-36033) is a privilege escalation vulnerability in the Windows DWM Core Library, and the third (CVE-2023-36036) is another … [Read more...] about November Patch Tuesday 2023: Updates and Analysis
October 2023 Patch Tuesday: Updates and Analysis
This month marks the 20th anniversary of Patch Tuesday, and Microsoft has released security updates for 104 vulnerabilities, including three zero-days. One of the zero-days (CVE-2023-41763) is an elevation of privilege vulnerability in Microsoft Skype for Business. The second (CVE-2023-36563) is an information disclosure vulnerability in Microsoft WordPad, and the third … [Read more...] about October 2023 Patch Tuesday: Updates and Analysis
August 2023 Patch Tuesday: Updates and Analysis
Microsoft has released security updates for 76 vulnerabilities and two zero-days for its August 2023 Patch Tuesday rollout. One of the zero-days (CVE-2023-38180) is a denial-of-service vulnerability in .NET and Visual Studio. The other zero-day (CVE-2023-36884) received a Defense in Depth update to mitigate a flaw under active attack; however, it is not a patch. Six of the … [Read more...] about August 2023 Patch Tuesday: Updates and Analysis
July 2023 Patch Tuesday: Updates and Analysis
Microsoft has released security updates for 131 vulnerabilities and a disclosure for one yet-unpatched vulnerability for its July 2023 Patch Tuesday rollout: 9 are rated as Critical while the remaining 122 are rated as Important. There is one vulnerability without a severity rating. July 2023 Risk Analysis This month’s leading risk type is remote code execution (28%), followed … [Read more...] about July 2023 Patch Tuesday: Updates and Analysis
June Patch Tuesday 2023: Updates and Analysis
Microsoft has released 78 security patches for its June 2023 Patch Tuesday rollout. Of the vulnerabilities patched today, 6 are classified as Critical and 38 are remote code execution (RCE) flaws. June 2023 Risk Analysis This month’s leading risk type is remote code execution (41%), followed by elevation of privilege at nearly 22% and a tie for denial of service and spoofing … [Read more...] about June Patch Tuesday 2023: Updates and Analysis
Elasticsearch and data architecture: 4 essential tools for improved analysis and storage
Organizations are becoming increasingly more reliant on data to make effective, evidence-based decisions to drive business outcomes. Whether this be assessing market conditions and improving customer experience, ensuring application uptime, or securing an organization, data from multiple sources — including consumers and internal systems — is critical to day-to-day … [Read more...] about Elasticsearch and data architecture: 4 essential tools for improved analysis and storage
Review and analysis of fake Trezor cryptowallet
Easy to steal and cash out, сryptocurrency is one of the most attractive digital assets for attackers. Accordingly, serious investors often use hardware cryptowallets to protect their crypto-investments. Such a wallet stores private keys away from vulnerable computers and smartphones and makes it much safer to sign transactions. But unfortunately, owning a hardware wallet … [Read more...] about Review and analysis of fake Trezor cryptowallet
Deepfake market analysis | Kaspersky official blog
Cybercrime quickly adopts new technologies. One of the most concerning trends is the rise of deepfakes — forged images, audio or video created with the aid of artificial intelligence, which makes them appear absolutely real — at least to the naked eye. The issue is all the more disturbing of late as tools for AI-generation become increasingly widespread and accessible to the … [Read more...] about Deepfake market analysis | Kaspersky official blog