G Data Security
541 FOLLOWERS
We keep you posted on the latest cyber threats: Learn more about what is new in the world of IT security. Knowledge is the best protection. G DATA CyberDefense AG, based in Bochum, is an innovative and rapidly expanding software house with a focus on IT security solutions.
G Data Security
2d ago
Infostealers are one of the most lucrative types of malware employed by criminals. And because this is a tried and tested approach, there are still new players entering this illegal game. The new kid on the block is called "Sharp Stealer", and one of its favourite targets are gamers.
  ..read more
G Data Security
1w ago
Many people make banking transactions online now. And since mobile devices are one of the most popular and convenient ways to shop and make payments, criminals are naturally drawn to this. A current example of a malware that specifically targets online banking shows how easy it is to fall for malware.
  ..read more
G Data Security
1M ago
RisePro resurfaces with new string encryption and a bloated MSI installer that crashes reversing tools like IDA. The "gitgub" campaign already sent more than 700 archives of stolen data to Telegram.
  ..read more
G Data Security
1M ago
At the end of January, a database with an allegedly unprecedented amount of personal information of billions of people appeared online. What does that mean for every one of us? What are the ramifications? Or is it all “more bark than bite”?
  ..read more
G Data Security
3M ago
The beginning of January is traditionally the perfect month to look ahead to the new year. What can we expect in 2024 in the field of security? I present six predictions for this year.
  ..read more
G Data Security
5M ago
An unusual attack tool has caught the attention and peaked the curiosity of G DATA analyst Hendrik Eckardt. The discovered RAT (Remote Access Tool) is apparently designed for networks where people take an annoyingly close - for the attackers - look at what is happening.
  ..read more
G Data Security
5M ago
During an incident response, looking for malware is often akin to looking for a needle in a hay stack. To complicate matters further, in the case of Cobalt Strike you often have no idea what that needle even looks like. And time is not on your side.
  ..read more
G Data Security
5M ago
A new variant of Agent Tesla uses the uncommon compression format ZPAQ to steal information from approximately 40 web browsers and various email clients. But what exactly is this file compression format? What advantage does it provide to threat actors? And why it is assumed that the version of Agent Tesla is “new”?
  ..read more
G Data Security
6M ago
Criminals hijack business accounts on Facebook and run their own advertising campaigns in someone else's name and at the expense of those affected. This quickly results in thousands of euros in damages for the actual account holders - not to mention the damage to their reputation.
  ..read more
G Data Security
7M ago
Artificial intelligence and adjacent technologies have been causing quite the stir lately. Many are concerned that AI is going to give rise to new and potentially completely machine-generated forms of criminal attacks. Let us look at some of those concerns.
  ..read more