Latest Posts with malware tag

malware

34 Articles 0 Followers


Malware Analysis: SikoMode

9 Nov 2021 7 minute read 0 comments 7R!XxSec

Special thanks to HuskyHacks and TCM Security! Welcome! Today we are responding to an urgent email from the Incident Response team at Husky Incident Response Corporation, as we continue upon the journey laid out for us in our ‘Practical Malware Analy...

Malware Analysis: SillyPutty

31 Oct 2021 7 minute read 0 comments 7R!XxSec

  Special Thanks to HuskyHacks and TCM Security   Welcome! Today we are doing some work for Husky Incident Response Corporation, thanks to our wonderful ‘Practical Malware Analysis and Triage’ contract, the details of which can be found here.We were...

My Comments on Malware and Spams in Email when I was a young student

5 Feb 2021 3 minute read 0 comments 0fajarpurnama0

Note This is the ninth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment customized CC-BY-SA where anyone can share, copy, republish,...

My Comments on Malware Quarantine when I was a young student

4 Feb 2021 2 minute read 0 comments 0fajarpurnama0

Quarantine is a place to isolate an object to prevent the infection of harmful substances. We can see when a person who is suffering from influenza is brought into an isolated place because influenza is known as a virus that could easily spread and i...

Intrusion Detection System Important Specifications

2 Feb 2021 2 minute read 0 comments 0fajarpurnama0

The performance of an intrusion detection system (IDS) is how well an IDS can detect intrusions in a given network. There are many factors in measuring its performance, but in my opinion a good IDS can detect a variety of attacks, can function on a h...

Having Intrusion Detection System Despite Having Anti Virus and Firewall

1 Feb 2021 3 minute read 1 comment 0fajarpurnama0

My comment on why need an intrusion detection system (IDS) is to prevent intruders from the system. I agree on using IDS, with the more famous, larger, and more important of a corporation's or institution's network, the more IDS is needed. As we enjo...

Malware Counter Measure Standard Operation Procedure in Old Corporations

31 Jan 2021 4 minute read 1 comment 0fajarpurnama0

I have a few experience in playing around with cyber attacks, but it was merely a curiosity and I did this on my own PCs and virtual machines. Back then I tried exploiting the vulnerability on port 445 SMB using an exploit prepared by Metasploit. Met...

Disrupted but Not Dead – Law Enforcement Scores a Big Win Against EMOTET Botnet

30 Jan 2021 1 minute read 0 comments Matthew Rosenquist

Congrats to the multinational authorities who collaborated to defang the infrastructure of EMOTET, a hugely successful cybercriminal malware platform. Unfortunately, this win may be short-lived. The attackers behind EMOTET have shown great resilienc...

Dealing with Malware for Ordinary Users

27 Jan 2021 3 minute read 2 comments 0fajarpurnama0

The countermeasures of Malicious Ware (malware) are mitigation (prevention) or treatment like any other measures to cope against harmful substances. To prevent virus/worm infection is either we put up security to defend ourselves or avoid interacting...

Three apps that were stealing crypto undetected for more than a year

8 Jan 2021 2 minute read 4 comments Heruvim78

Security firm Intezer Labs discovered a malware that was running undetected for more than a year, using face apps and emptying wallets for thousands users, indiscriminately infecting Windows, macOS and Linux operating systems.  The remote access troj...