We take a closer look at the Spelevo exploit, its infection method, and the new direction attackers are taking the Shade ransomware to make money while avoiding publicity.
Attackers are turning even the most common activities into a possible threat. Read about the latest example of this trend here.
In 2018, the Cybereason Nocturnus team identified an advanced, persistent attack targeting global telecommunications providers.
We have found an active malware that uses LOLBins and delivers customized payloads called Adobe Worm Faker.
There’s an active, ongoing campaign exploiting a widespread vulnerability in linux email servers. Read about the attack first here.
In this research, we outline how to enable the execution of 64-bit shellcode via Excel 4.0 macros and previous research on 32-bit shellcode.
Ransomware is not a new form of attack, but GandCrab has upgraded it to be more dynamic and harder to resolve.
In this research, we introduce a meticulously planned, malicious operation against a financial institution in April of 2019 by TA505.