JavaScript-PHP Joint Exercise Delivers Nemucod Ransomware
The ransomware Nemucod has been very prevalent in the last few months. Nemucod’s habit of frequently changing its delivery mechanism...
Microsoft’s June Patch Kills Potential CFG Bypass
After applying Microsoft’s June patch, we noticed some interesting changes that prevent a security bypass of Windows’ Control Flow Guard...
‘Thrones’ Jon Snow Appears to Employ Neutrino Exploit Kit
This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the...
Zcrypt Expands Reach as ‘Virus Ransomware’
McAfee has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious...
Malware Mystery: JS/Nemucod Downloads Legitimate Installer
JS/Nemucod is the detection name given to a family of malicious JavaScript downloaders that have appeared in spam campaigns since last year....
Can Zealous Security Cause Harm?
Good security requires balancing risks, costs, and usability. Too much or too little of each can be unhealthy and lead...
Server-Side Request Forgery Takes Advantage of Vulnerable App Servers
This blog was written by Kunal Garg. Server-side request forgery is an attack in which an attacker can force a...
Current Campaign Delivers Hundreds of Thousands of Polymorphic Ransomware
You might have been getting out of bed when attackers started sending hundreds of thousands of fake invoices the morning...
The Morning After: What Happens to Data Post-Breach?
This post first appeared on the security website Dark Reading. We need consumers and businesses to not simply shrug off...
CVE-2016-0018: DLL Planting Leads to a Remote Code Execution Vulnerability
DLL planting, also known as DLL side loading, is a popular attack technique today. If we take a look at...