HorseDeal Riding on The Curveball!

Credit to Author: Jayesh kulkarni| Date: Wed, 05 Feb 2020 06:17:49 +0000

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched a very interesting vulnerability in their monthly Patch Tuesday update for January 2020. It’s a spoofing vulnerability in Windows CryptoAPI (Crypt32.dll) validation mechanism for Elliptic Curve Cryptography (ECC) certificates. An attacker could…

Read more

First Node.js-based Ransomware : Nodera

Credit to Author: Ravi Gidwani| Date: Wed, 22 Jan 2020 11:12:25 +0000

Recently while threat hunting, Quick Heal Security Labs came across an unusual Node.js framework based Nodera ransomware. The use of Node.js framework is not seen commonly across malware families. Latest development by threat actors reveal a nasty and one-of-its-kind ransomware being created; one that uses Node.js framework, which enables it to infect Windows…

Read more

Windows 7 reaches End of Life (EOL) – Are you ready for the risks or would you rather upgrade your OS?

Credit to Author: Sushmita Kalashikar| Date: Wed, 22 Jan 2020 05:37:49 +0000

14 Jan 2020 marked a huge day for Windows, as Microsoft ended support for Windows 7, the operating system that had been touching lives for nearly 11 years. Introduced almost a decade back, Windows 7 was designed basically to fix the failures that came with Windows Vista. The popularity of…

Read more

Ransomware As A Tool – LockerGoga

Credit to Author: Ghanshyam More| Date: Wed, 03 Jul 2019 07:18:00 +0000

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild…

Read more

16 vulnerabilità critiche, alcune delle quali sfruttate, sono state risolte negli aggiornamenti Windows di luglio 2019

Credit to Author: Sophos Italia| Date: Mon, 22 Jul 2019 16:01:52 +0000

Alcuni hacker russi avrebbero sfruttato due vulnerabilità durante i loro attacchi<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/5fzmmHOt0_g” height=”1″ width=”1″ alt=””/>

Read more