<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

4 Challenges Faced by Organizations Transitioning to Remote Work

Vulnerabilities

4 Challenges Faced by Organizations Transitioning to Remote Work

During the past few months, many companies have contacted us with various questions and requests about remote security. In our conversations with them, we’ve noticed four key challenges that we wanted to explore.

Remote Work Because of a Pandemic Could Give Your Company a Different Kind of Virus

Vulnerabilities

Remote Work Because of a Pandemic Could Give Your Company a Different Kind of Virus

Cyber attackers seeking to take advantage of the influx of employees working from home will increase phishing attacks and start attacking online services that are being used more than usual.

Glupteba Expands Operation and Toolkit with LOLBins And Cryptominer

LOLbins

Glupteba Expands Operation and Toolkit with LOLBins And Cryptominer

The Nocturnus team has identified variants of Glupteba that made use of an extensive arsenal, including LOLBins and a cryptocurrency miner.

Watch Where You Browse - The Fallout Exploit Kit Stays Active

Vulnerabilities

Watch Where You Browse - The Fallout Exploit Kit Stays Active

Attackers are turning even the most common activities into a possible threat. Read about the latest example of this trend here.

Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers

Advanced Persistent Threat

Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers

In 2018, the Cybereason Nocturnus team identified an advanced, persistent attack targeting global telecommunications providers.

Adobe Worm Faker Uses LOLbins And Dynamic Techniques To Deliver Customized Payloads

Vulnerabilities

Adobe Worm Faker Uses LOLbins And Dynamic Techniques To Deliver Customized Payloads

We have found an active malware that uses LOLBins and delivers customized payloads called Adobe Worm Faker.

New Pervasive Worm Exploiting Linux Exim Server Vulnerability

Cybersecurity

New Pervasive Worm Exploiting Linux Exim Server Vulnerability

There’s an active, ongoing campaign exploiting a widespread vulnerability in linux email servers. Read about the attack first here.

Excel4.0 Macros - Now with Twice The Bits!

Vulnerabilities

Excel4.0 Macros - Now with Twice The Bits!

In this research, we outline how to enable the execution of 64-bit shellcode via Excel 4.0 macros and previous research on 32-bit shellcode.