malware

48 Articles 0 Followers


Virus, Malware, and Ransomware are Allies in Cybercrime

3 Nov 2022 3 minute read 2 comments Debesh Choudhury

When you have an asset, there is always a threat. The world of people moves around money and wealth. Who doesn't need money? If I see a valuable asset, the first thing that comes to my mind is how the asset is protected from theft. When I see jewelr...

Claire

10 Aug 2022 9 minute read 0 comments Diomedes

    Claire, wallhere.com “I don’t consider myself pessimistic” I thought to myself, “yet this degree of happiness does not subsist in any human affairs.”  And in retrospect I was right.  We spent the next hour tearing into a three-volume set called...

DO NOT DOWNLOAD THE LEDGER APP FROM THE MICROSOFT STORE. IT IS MALWARE!!!!!

14 Jul 2022 2 minute read 0 comments unhedge0x

Hey FAM!!!    I am here once again with this warning off crypto Twitter. But hope you all are doing great and securing your staked SATS for the future, and waiting one day for that immersive capital gains. As we are all in this financial decoupling,...

Deadbolt, new ransomware attacking QNAP's products

27 Jan 2022 1 minute read 0 comments Aldeneer

"DeadBolt has been widely targeting all NAS exposed to the Internet without any protection and encrypting users’ data for Bitcoin ransom."   This ransomware wants to pay us 0.3BTC to unlock our data. Attackers say that they used some kind of 0day and...

Malware Analysis: SikoMode

9 Nov 2021 7 minute read 0 comments 7R!XxSec

Special thanks to HuskyHacks and TCM Security! Welcome! Today we are responding to an urgent email from the Incident Response team at Husky Incident Response Corporation, as we continue upon the journey laid out for us in our ‘Practical Malware Analy...

Malware Analysis: SillyPutty

31 Oct 2021 7 minute read 0 comments 7R!XxSec

  Special Thanks to HuskyHacks and TCM Security   Welcome! Today we are doing some work for Husky Incident Response Corporation, thanks to our wonderful ‘Practical Malware Analysis and Triage’ contract, the details of which can be found here.We were...

My Comments on Malware and Spams in Email when I was a young student

5 Feb 2021 3 minute read 0 comments 0fajarpurnama0

Note This is the ninth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment customized CC-BY-SA where anyone can share, copy, republish,...

My Comments on Malware Quarantine when I was a young student

4 Feb 2021 2 minute read 0 comments 0fajarpurnama0

Quarantine is a place to isolate an object to prevent the infection of harmful substances. We can see when a person who is suffering from influenza is brought into an isolated place because influenza is known as a virus that could easily spread and i...

Intrusion Detection System Important Specifications

2 Feb 2021 2 minute read 0 comments 0fajarpurnama0

The performance of an intrusion detection system (IDS) is how well an IDS can detect intrusions in a given network. There are many factors in measuring its performance, but in my opinion a good IDS can detect a variety of attacks, can function on a h...

Having Intrusion Detection System Despite Having Anti Virus and Firewall

1 Feb 2021 3 minute read 1 comment 0fajarpurnama0

My comment on why need an intrusion detection system (IDS) is to prevent intruders from the system. I agree on using IDS, with the more famous, larger, and more important of a corporation's or institution's network, the more IDS is needed. As we enjo...