Remove 11
Remove 2014 Remove Analysis Remove Computer and Electronics Remove Data Remove Security
article thumbnail

Using Microsoft Powerpoint as Malware Dropper

Security Affairs

Marco Ramilli, founder and CEO at cyber security firm Yoroi has explained how to use Microsoft Powerpoint as Malware Dropper. The downloaded PE Executable is a.NET file created by ExtendedScript Toolkit (according to compilation time) on 2018-11-13 15:21:54 and submitted a few hours later on VirusTotal. Stage 3: NET file.

article thumbnail

Is Emotet gang targeting companies with external SOC?

Security Affairs

Today I’d like to share a quick analysis resulted by a very interesting email which claimed to deliver a SOC “weekly report” on the victim email. doc ( 6125489453c1824da3e28a54708e7c77875e500dd82a59c96c1d1e5ee88dcad7 ) is the delivered file sent on Oct 11, 2019, 11:06:09 PM from grecia@ambientehomedecor.com. Conclusion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The ‘MartyMcFly’ investigation: Italian naval industry under attack

Security Affairs

Experts at Yoroi’s Cyber Security Defence Center along with Fincantieri’s security team investigated the recently discovered Martymcfly malware attacks. Analysis ) where unknown attackers were targeting Italian naval industries. Whois data of “anchors-chain.com”. Background. Malicious Email. anchors-chain.com.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Some technology trends such as real-time data analytics are ongoing, while others are more recent, such as blockchain. This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Srivastav 2014, p 18). Risk Management and DT Experience.