Cybersecurity

More Signs of a Qakbot Resurgence

Cybercrime , Endpoint Detection & Response (EDR) , Fraud Management & Cybercrime Qakbot Wouldn’t Be the First Trojan to Come Back After a Takedown Akshaya Asokan (asokan_akshaya) • February 13, 2024     Security researchers are seeing new examples of Qakbot malware. (Image: Shutterstock) Takedowns aren’t always forever in cyberspace. Months after a U.S. law […]

Cybersecurity

Purple teaming and the role of threat categorization – Help Net Security

Organizations constantly work to ensure optimal threat detection and prevention across their systems. One question gets asked repeatedly: “Can we detect the threats we’re supposed to be able to detect?” Red team assessment, penetration testing, and even purple team assessments (in their current form) are all designed to answer these questions. Unfortunately, as attacks get […]

Cybersecurity

ExtraHop Raises $100M in Growth Capital

ExtraHop, a Seattle, WA-based company which specialises in cloud-native network detection and response (NDR), raised $100M in Growth Capital. The round saw participation from undisclosed existing investors. The company intends to use the funds to expand operations and its business reach. Led by Greg Clark, CEO, ExtraHop provides the Reveal(x) platform that delivers 360-degree visibility […]

Cybersecurity

A Look at the Nim-based Campaign Using Microsoft Word Docs to Impersonate the Nepali Government

Summary Threat actors often employ stealthy attack techniques to elude detection and stay under the defender’s radar. One way they do so is by using uncommon programming languages to develop malware. Using an uncommon programming language to develop malware provides several benefits, including: Evading some signature based detections Impeding analysis by malware analysts that are […]

Cybersecurity

GULOADER Adds New Anti-Analysis Tactic to Arsenal | Cyware Hacker News

Security experts have unmasked a new trick adopted by the GULOADER malware to evade detection by antivirus software. The highly evasive shellcode downloader malware, which typically spreads through emails bearing ZIP archives or links containing a VBScript file, has been found leveraging Vectored Exception Handler (VEH) capability to make analysis challenging. More in detail According […]