EHA
Home Search

malware - search results

If you're not happy with the results, please do another search
BadPack APK Malware

BadPack APK Malware Using Wired Trick to Attack Users & Stay Undetected

Hackers often exploit the APK packers to hide malicious codes within Android applications. This will make detecting and analyzing malware more difficult for security...
Malware Via JPEG Files

Beware Of Weaponized AWS Packages That Deliver Malware Via JPEG Files

Attackers hide malicious payloads deep within seemingly legitimate Python packages, where two such packages were found. One, img-aws-s3-object-multipart-copy, is a copy of a real...
Beware of Fake Microsoft Teams That Deliver macOS Malware

Beware of Fake Microsoft Teams That Deliver macOS Malware

Hackers often mimic popular tools like Microsoft Teams to exploit people's trust and familiarity with these applications.  This strategy increases the probability of users' subsequent...
Killer Ultra Malware Attacking EDR Tools From Symantec, Microsoft, And Sentinel One

Killer Ultra Malware Attacking EDR Tools From Symantec, Microsoft, & SentinelOne

Killer Ultra malware has been found to be targeting endpoint detection and response (EDR) tools from Symantec, Microsoft, and Sentinel One in ransomware attacks. Killer...
Encryption Algorithms

What are the Encryption Algorithms Used in Modern Malware? – A Comprehensive Guide

Malware authors increasingly rely on encryption to obfuscate their code and evade detection by security tools such as YARA, Suricata, and other static file...
Malware Dissection with Gemini 1.5 Flash model in 12.72 seconds

Malware Dissection with Gemini 1.5 Flash model in 12.72 seconds

The ability to swiftly and accurately analyze malware is paramount. Traditional reverse engineering and code analysis methods are often too slow to keep pace...
Hackers Leveraging Compiled V8 JavaScript In Wild To Deploy Malware

Hackers Leveraging Compiled V8 JavaScript In Wild To Deploy Malware

Hackers exploit compiled V8 JavaScript to obfuscate their malicious code, as the compiled bytecode effectively hides the malware's original source code and intentions. Recently, the...
Information Stealing Malware Distributed as AT tools & Chrome Extensions

Information Stealing Malware Distributed as AT tools & Chrome Extensions

The first half of 2024 has seen a significant rise in information-stealing malware disguised as AI tools and Chrome extensions. This trend highlights cyber...
Hackers Actively Exploiting Microsoft SmartScreen Vulnerability To Deploy Stealer Malware

Hackers Actively Exploiting Microsoft SmartScreen Vulnerability To Deploy Stealer Malware

Hackers attack Microsoft SmartScreen as it's a cloud-based, anti-phishing, and anti-malware component that determines whether a website is potentially malicious, protecting users from downloading...
Malicious QR Reader App in Google Play Delivers Anatsa Banking Malware

Malicious QR Reader App in Google Play Delivers Anatsa Banking Malware

Cybersecurity experts have identified a malicious QR code reader app on Google Play that is delivering the notorious Anatsa banking malware. This discovery underscores...

Managed WAF

Website

Latest News