Home Tags Hide

Tag: Hide

Locky, Cerber Ransomware Skilled at Hiding

Since January, a number of ransomware families are sharing a common infrastructure with different techniques allowing the malware to hide from detection systems.

PetrWrap: the new Petya-based ransomware used in targeted attacks

This year we found a new family of ransomware used in targeted attacks against organizations.After penetrating an organization’s network the threat actors used the...

Boffins show Intel’s SGX can leak crypto keys

Software Guard Extensions are supposed to hide data.But the 'Prime+Probe attack' fixes that A researcher who in January helped highlight possible flaws in Intel's...

California Supreme Court: No, you can’t hide public records on a...

Enlarge / Facade of the Supreme Court of California, as seen on October 2, 2016. (credit: Smith Collection/Gado/Getty Images) The California Supreme...

FCC lets “billion-dollar” ISPs hide fees and data caps, Democrat says

Who needs fee disclosures? (credit: Getty Images | JW LTD) ISPs with 250,000 or fewer subscribers won't have to follow rules that require greater disclosures...

New(ish) Mirai Spreader Poses New Risks

A cross-platform win32-based Mirai spreader and botnet is in the wild and previously discussed publicly. However, there is much information confused together, as if...

Nowhere to hide: 9 new hacks coming to get you

Securitywise, the internet of things is going as badly as most computer security experts predicted.In fact, most vendors don’t fully appreciate the potential threats...

Bracket’s ‘metavisor’ could have stopped DNC hack, says CEO

At RSA 2017, Bracket Computing announced a pair of new features for its 'metavisor' and CEO Tom Gillis said it can both diagnose and...

Fileless Memory-Based Malware Plagues 140 Banks, Enterprises

Attackers have been using fileless malware to hide in the memory of enterprises, steal data, and vanish without a trace.

Fileless attacks against enterprise networks

During incident response, a team of security specialists needs to follow the artefacts that attackers have left in the network.Artefacts are stored in logs,...

Firefox bares teeth, attacks sites that collect personal data

If it wants a password and doesn't use HTTPS, Mozilla will breathe fire Shoddy sites will have fewer places to hide with Firefox joining Chrome...