InfoSec Articles (04/09/24 – 04/23/24)
Malware Patrol Blog
by Diana Alvarez
2d ago
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your organization safe. Whether you’re a cybersecurity professional or a concerned individual, our biweekly blog post is designed to keep you informed and empowered. For more articles, check out our #onpatrol4malware blog. Justice Department Seizes Four Web Domains Used to Create Over 40,000 Spoofed Websites and Store the Personal Informatio ..read more
Visit website
Tunnel Vision: Looking Out for Malicious Tunneling Use
Malware Patrol Blog
by Malware Patrol
2d ago
Tunneling services, also known as “ingress-as-a-service” offers were originally designed to facilitate secure communication over untrusted networks. Over the past several years they have increasingly become tools of choice for cybercriminals. Offering a cloak of anonymity and encrypted pathways, these services have emerged as an option that allows attackers to obfuscate their activities and bypass conventional security measures. In this blog, we will explain how they work, explore the types of cyber threats they enable, and provide some mitigation strategies to fortify your defenses agains ..read more
Visit website
InfoSec Articles (03/36/24 – 04/09/24)
Malware Patrol Blog
by Diana Alvarez
2w ago
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your organization safe. Whether you’re a cybersecurity professional or a concerned individual, our biweekly blog post is designed to keep you informed and empowered. For more articles, check out our #onpatrol4malware blog. Oxycorat Android RAT Spotted On Dark Web Stealing Wi-Fi Passwords Source: GBHackers According to the details, the RAT in ..read more
Visit website
InfoSec Articles (03/12/24 – 03/26/24)
Malware Patrol Blog
by Diana Alvarez
1M ago
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your organization safe. Whether you’re a cybersecurity professional or a concerned individual, our biweekly blog post is designed to keep you informed and empowered. For more articles, check out our #onpatrol4malware blog. Microsoft Warns of New Tax Returns Phishing Scams Targeting You Source: HACK READ New and sophisticated tax phishing sca ..read more
Visit website
InfoSec Articles (02/13/24 – 02/27/24)
Malware Patrol Blog
by Diana Alvarez
2M ago
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your organization safe. Whether you’re a cybersecurity professional or a concerned individual, our biweekly blog post is designed to keep you informed and empowered. For more articles, check out our #onpatrol4malware blog. LockBit ransomware returns, restores servers after police disruption Source: BLEEPING COMPUTER On Saturday, LockBit anno ..read more
Visit website
InfoSec Articles (01/30/24 – 02/13/24)
Malware Patrol Blog
by Diana Alvarez
2M ago
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your organization safe. Whether you’re a cybersecurity professional or a concerned individual, our biweekly blog post is designed to keep you informed and empowered. For more articles, check out our #onpatrol4malware blog. Maldocs of Word and Excel: Vigor of the Ages Source: CHECK POINT RESEARCH In our research, we show the statistics on att ..read more
Visit website
InfoSec Articles (01/16/24 – 01/30/24)
Malware Patrol Blog
by Diana Alvarez
3M ago
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your organization safe. Whether you’re a cybersecurity professional or a concerned individual, our biweekly blog post is designed to keep you informed and empowered. For more articles, check out our #onpatrol4malware blog. The Endless Struggle Against APT10: Insights from LODEINFO v0.6.6 – v0.7.3 Analysis Source: ITOCHU Cyber Intelligence In ..read more
Visit website
InfoSec Articles (01/02/24 – 01/16/24)
Malware Patrol Blog
by Diana Alvarez
3M ago
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your organization safe. Whether you’re a cybersecurity professional or a concerned individual, our biweekly blog post is designed to keep you informed and empowered. For more articles, check out our #onpatrol4malware blog. CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign Source: TREND MICRO CVE-2023-36025 affects M ..read more
Visit website
InfoSec Articles (12/19/23 – 01/02/24)
Malware Patrol Blog
by Diana Alvarez
4M ago
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your organization safe. Whether you’re a cybersecurity professional or a concerned individual, our biweekly blog post is designed to keep you informed and empowered. For more articles, check out our #onpatrol4malware blog. Threat Actors Exploit CVE-2017-11882 To Deliver Agent Tesla Source: Zscaler Threat actors strategically utilize words li ..read more
Visit website
InfoSec Articles (12/05/23 – 12/19/23)
Malware Patrol Blog
by Diana Alvarez
4M ago
Welcome to our biweekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your organization safe. Whether you’re a cybersecurity professional or a concerned individual, our biweekly blog post is designed to keep you informed and empowered. For more articles, check out our #onpatrol4malware blog. QakBot Malware Resurfaces with New Tactics, Targeting the Hospitality Industry Source: The Hacker News A new wave of phi ..read more
Visit website

Follow Malware Patrol Blog on FeedSpot

Continue with Google
Continue with Apple
OR