malicious

  1. Tomcat

    Cobalt Strike in an alluring wrapper: malicious Excel spreadsheets flooded Ukraine

    Fortinet researchers have uncovered a series of sophisticated attacks of increased complexity. Researchers from the company Fortinet recorded a new complex malicious operation aimed at devices in Ukraine. The main goal of attackers is to implement Cobalt Strike and seize control over...
  2. Father

    Malicious Chrome extension VenomSoftX steals passwords and cryptocurrency

    Experts warn about a malicious extension for Google Chrome called "VenomSoftX". By installing this addon, users run the risk that the contents of their clipboard in Windows will fall into the hands of intruders. In fact, VenomSoftX is one of the components of a malicious program for...
  3. Father

    What does malicious software look like?

    The variety of security tools is largely due not only to the number of" entry points " in different ICS, but also to the number of different types of malware, each of which can solve a specific task or several at once. Malicious software (VPO) or malware is the collective name of all utilities...
  4. Teacher

    In Komi, employees of the Ministry of Internal Affairs of Russia and the police of the republic identified a teenager who sold malicious software

    In the Komi Republic, employees of the Department for Organizing the Fight against the Illegal Use of Information and Communication Technologies of the Ministry of Internal Affairs of Russia, together with colleagues from the republican police, as a result of operational search activities...
  5. Lord777

    Malicious traffic research

    This article will tell you how to analyze and detect malicious network interaction on the network. The information is provided for review. Here we will discuss the main tools for analyzing network traffic and consider the sources of examples for practice. Network Interaction Analysis For the...
Top