Ransomware identification for the judicious analyst
When facing a ransomware infection, it helps to be familiar with some tools as well as key points to identify ransomware correctly.
Ransomware identification for the judicious analyst
When facing a ransomware infection, it helps to be familiar with some tools as well as key points to identify ransomware correctly.
Strange Bits: Sodinokibi Spam, CinaRAT, and Fake G DATA
In the second part of our Strange Bits series we are taking a closer look at Sodinokibi Spam E-Mails, CinaRAT and a Malware that tries to imitate G DATA.
Interview on VM Security: “We save our customers hard cash”
If you run hundreds of virtual machines on one server, you need to provide adequate protection. In this interview, Jan Schlemmer from G DATA explains the problems and solutions.
Vulnerability in WhatsApp: Targeting human rights activists
According to his own statements, a London human rights lawyer has become the target of an attack with an espionage tool. A security vulnerability in Whatsapp made it possible to taget data on a compromised device.
Strange Bits: HTML Smuggling and GitHub Hosted Malware
Sometimes we see odd stuff, like malware that employs a technique called "HTML Smuggling". Also, malware on GitHub seems to be a thing these days.
IoT security flaws: 2 Million devices affected
More than two million IoT devices are affected by a current vulnerability. This enables attackers to take control over webcams and other affected devices. At the moment, no fix is in sight.
HowTo: Combine Graylog and AlertManager
Are you using Graylog and would like to handle alerts with help from Prometheus AlertManager? No problem, we got a solution for you!
Graph databases: Bad neighborhoods, parents and machine learning
This is the final post in our graph database series, where we introduce a classification algorithm that operates on a graph. Within it, we give a high level description of the algorithm and we point out some general steps that can be carried to conceptually improve the overall performance.
Native single-binary with .Net Core 3.0 and Azure Pipeline
How to create an native single-binary executable for Windows and Linux with C#, .Net Core 3.0 preview and Azure Pipelines.
GarrantyDecrypt Ransomware poses as EnigmaSoft's SpyHunter
A new ransomware variant discredits EnigmaSoft by pretending to be SpyHunter. The ransom message reads like mockery. Some of the encrypted files might be recoverable.