Home Tags Domain

Tag: Domain

Pesky phishing pages using international domain names just won't go away It's been known for a long while that people can use similar-looking non-Roman characters to create internet addresses that look similar to real ones.…
A vulnerability in the role-based access control (RBAC) functionality of Cisco Prime Infrastructure could allow an authenticated, remote attacker to perform a privilege escalation in which one virtual domain user can view and modify another virtual...
Acquisition supports vision of making enterprise-grade security accessible to every organisation through simplification of packaging, pricing, and product usability. 17 January 2018 – WatchGuardreg; Technologies has announced that it has acquire...
At the beginning of October 2017, we discovered new Android spyware with several features previously unseen in the wild.
In the course of further research, we found a number of related samples that point to a long-term development process. We believe the initial versions of this malware were created at least three years ago.
Data democratization is the idea that digital information should be accessible and understandable to the average end user as a basis for decision-making.

Data democratization has been promoted as a competitive advantage in the global economy and a d...
In an earlier publication we noted that cybercriminals were making use of social engineering to install this sort of software on usersrsquo; computers.

This time, wersquo;d like to dwell more on how exactly the computers of gullible users start working for cybercriminals.
Because we haven't set fired SMBv1 into the Sun Dell EMC has patched an SMBv1 bug in its Data Domain Deduplication and Data Protection software.…
As many of you may recall, the software design and architecture style known as service-oriented architecture (SOA) emerged in the mid 1990s.
Since then, we have discovered better ways to build systems, including advances in cloud-based virtualizatio...
At the end of September, Palo Alto released a report on Unit42 activity where they – among other things – talked about PYLOT malware. We have been detecting attacks that have employed the use of this backdoor since at least 2015 and refer to it as Travle.

Coincidentally, KL was recently involved in an investigation of a successful attack where Travle was detected, during which we conducted a deep analysis of this malware.
Attackers bypass HTTPS encryption protection by registering new TLS certificate.

Jack of all trades

Among this array of threats we found a rather interesting sample – Trojan.AndroidOS.Loapi.

This Trojan boasts a complicated modular architecture that means it can conduct a variety of malicious activities: mine cryptocurrencies, annoy users with constant ads, launch DDoS attacks from the affected device and much more.