Search

Showing 59 results for: "steganography".

There’s a better way to secure your network
Network security controls are no longer reliable or sufficient. They are easily evaded, prone to false positives, and feed a costly ecosystem of alert management and incident response. According to pen testing by Positive Technologies, an external attacker can breach an organization's network perim...
Malicious PyPI ‘requests’ fork hides backdoor in PNG file
A malicious PyPI package based on the popular “requests” package was found to contain a backdoor hidden in a PNG file, security researchers revealed Friday. The package, “requests-darwin-lite,” is a fork of the legitimate “requests” Python package and was published to the open-source Python repo...
Steganography leveraged in new global TA558 attack campaign
More than 320 organizations in various sectors around the world, most of which are in Latin America, have been subjected to the new SteganoAmor attack campaign by the TA558 hacking operation that involved the use of steganography to enable the delivery of various malicious payloads, according to Bl...
Remcos RAT deployed via IDAT Loader
Attacks leveraging the IDAT Loader to facilitate Remcos RAT distribution have been deployed by the UAC-0184 threat operation against a Finland-based Ukrainian organization, reports The Hacker News.Steganography has been utilized by IDAT Loader, which has similarities with the Hijack Loader, for Rem...
Novel info-stealing malware leveraged by North Korean hackers
BleepingComputer reports the North Korean state-sponsored threat group APT37, also known as RedEyes or ScarCruft, has been launching attacks with the new M2RAT information-stealing malware aimed at compromising Windows and mobile devices since last month. Phishing emails sent by the attackers conta...
Worok backdoor concealed in PNG images
The Worok threat group has been confirmed by Avast researchers to be leveraging PNG images as a means to conceal information-stealing malware, following earlier findings by ESET assuming such a threat vector, reports BleepingComputer. Despite the uncertainty surrounding the approach used by Worok t...
Worok threat group observed using new tools, techniques in cyberattacks
Researchers at ESET found the Worok threat group using undocumented tools and new obfuscation techniques in attacks in Asia. (Photo by Ethan Miller/Getty Images) Researchers reported finding targeted attacks using undocumented tools and new obfuscation techniques against high-profile telecoms, b...

You can skip this ad in 5 seconds