Announcement

Collapse
No announcement yet.

Articles

Collapse

CMS Home Page

  • Filter
  • Time
  • Show
Clear All
new posts

  • An (un)documented Word feature abused by attackers

    An (un)documented Word feature abused by attackers

    A little while back we were investigating the malicious activities of the Freakyshelly targeted attack and came across spear phishing emails that had some interesting documents attached to them. They were in OLE2 format and contained no macros, exploits or any other active content.

    More...
    See more | Go to post

  • Where i lived

    Where i lived

    Formerly known as Carr's Row,[4] Sandy Row is one of the oldest residential areas of Belfast.[5] Its growth in population was in large part due to the expansion of the linen industry in Rowland Street.[6] The name Sandy Row derived from the sandbank which abutted the road that followed the high-water mark resulting from the flow off the tidal waters of the Lagan River estuary. For over two thousand years, the road along the sandbank was the principal thoroughfare leading south from Carrickfergu...
    See more | Go to post

  • PS Comet

    PS Comet

    The original PS Comet

    Thurston's illustration, 1878 The original PS (Paddle Steamer) Comet was constructed for Henry Bell in 1811, by John Wood, a Port Glasgow shipbuilder, and completed on January 18, 1812. The first passenger vessel built in Europe, PS Comet was a wooden vessel of some 30 tons, about 40 feet in length, and 10 feet in beam, and originally fitted with four paddle wheels, arranged as two on each side, driven by an engine rated at three horsepower. The two sets of twin paddle wheels were later replaced by single wheel on each side, and the l...
    See more | Go to post
There are no articles in this category.
  • Filter
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.

Categories

Collapse

Article Tags

Collapse

Latest Articles

Collapse

  • Skygofree: Following in the footsteps of HackingTeam
    willie
    At the beginning of October 2017, we discovered new Android spyware with several features previously unseen in the wild. In the course of further research, we found a number of related samples that point to a long-term development process. We believe the initial versions of this malware were created at least three years ago.

    More...
    16-01-2018, 14:52
  • Happy IR in the New Year!
    willie
    Endpoint anal In IR cases we use a very simple script that is uploaded to every Windows computer in the corporate network to collect logs, NTFS data, entries from the Windows registry and strings from the binary files to find out how exactly the attackers were moving through the network. It’s holiday season and it is our pleasure to share this script with you.

    More...
    28-12-2017, 20:53
  • Nhash: petty pranks with big finances
    willie
    In an earlier publication we noted that cybercriminals were making use of social engineering to install this sort of software on users’ computers. This time, we’d like to dwell more on how exactly the computers of gullible users start working for cybercriminals.

    More...
    22-12-2017, 06:22
  • Travle aka PYLOT backdoor hits Russian-speaking targets
    willie
    At the end of September, Palo Alto released a report on Unit42 activity where they – among other things – talked about PYLOT malware. We have been detecting attacks that have employed the use of this backdoor since at least 2015 and refer to it as Travle. Coincidentally, KL was recently involved in an investigation of a successful attack where Travle was detected, during which we conducted a deep analysis of this malware.

    More...
    20-12-2017, 10:46
  • Jack of all trades
    willie
    Among this array of threats we found a rather interesting sample – Trojan.AndroidOS.Loapi. This Trojan boasts a complicated modular architecture that means it can conduct a variety of malicious activities: mine cryptocurrencies, annoy users with constant ads, launch DDoS attacks from the affected device and much more.

    More...
    18-12-2017, 17:11
  • Kaspersky Security Bulletin. Overall statistics for 2017
    willie
    In 2017, Kaspersky Lab’s web antivirus detected 15 714 700 unique malicious objects (scripts, exploits, executable files, etc.) and 199 455 606 unique URLs were recognized as malicious by web antivirus components. Kaspersky Lab solutions detected and repelled 1 188 728 338 malicious attacks launched from online resources located in 206 countries all over the world.

    More...
    14-12-2017, 19:08
Working...
X