article thumbnail

Malicious PDF Analysis

Security Affairs

In the last few days I have done some analysis on malicious documents, especially PDF. Then I thought, “Why not turn a PDF analysis into an article?” Most security tools must always be adapted to this new reality of attack and infection. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

Malware Static Analysis

Security Affairs

Malware researcher and founder of Yoroi Marco Ramilli shared a simple tool for malware static analysis he used to perform massive Malware analysis research. By clicking on the desired table raw a modal popup will show you static analysis details such as, which YARA rule has been hit. You can make your analysis here: [link].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware campaign attempts to evade analysis with Any.Run sandbox

Security Affairs

Malware authors are implementing the capability to check if their malicious code is running in the Any.Run malware analysis service. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini.

article thumbnail

Dragos Report: Analysis of ICS flaws disclosed in 2019

Security Affairs

According to a report published by Dragos, the experts analyzed 438 ICS vulnerabilities that were reported in 212 security advisories, 26% of advisories is related to zero-day flaws. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Access 107
article thumbnail

“Collection #1” Data Breach Analysis – Part 2

Security Affairs

The cyber security expert Marco Ramilli continues its analysis of the data leak known as Collection #1, he shared some interesting views on data The cyber security expert Marco Ramilli continues its analysis of the data leak known as Collection #1, he shared some interesting views on data. Pierluigi Paganini.

article thumbnail

SEC Xtractor – Experts released an open-source hardware analysis tool

Security Affairs

Security and consulting company SEC Consult announced the release of an open-source hardware analysis tool dubbed SEC Xtractor. Security firm SEC Consult announced the release of an open-source hardware analysis tool dubbed SEC Xtractor. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

Malware campaign employs fake security certificate updates

Security Affairs

Crooks are using a new phishing technique to trick victims into accepting the installation of a security certificate update and deliver malware. The new technique differs from previous ones because visitors to infected websites are asked to install a software update because the security certificate had expired. pw / jquery.

Security 115