Remove about
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Humans have used technology to transform their societies from prehistoric times up to the present. This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

Humans have used technology to transform their societies from prehistoric times up to the present. This means imagining the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using Microsoft Powerpoint as Malware Dropper

Security Affairs

In the beginning, the Microsoft Powerpoint presentation looked like a white blank page but performing a very interesting and hidden connection to hxxps://a.doko.moe/wraeop.sct. Indicators of Compromise (IoCs) for the malicious code are reported in the original analysis published by Marco Ramilli in his blog.

article thumbnail

MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry

Security Affairs

Today I’d like to share an interesting analysis of a Targeted Attack found and dissected by Yoroi (technical details are available here ). The analyzed email presented two attachments to the victim: A company profile, aiming to present the company who was asking for spare parts.

article thumbnail

OilRig APT group: the evolution of attack techniques over time

Security Affairs

Security researcher Marco Ramilli presents a comparative analysis of attacks techniques adopted by the Iran-Linked OilRig APT group. Today I’d like to share a comparative analysis of OilRig techniques mutation over time. The original post and other interesting analysis are published on the Marco Ramilli’s blog: [link].

article thumbnail

Two hacker groups attacked Russian banks posing as the Central Bank of Russia

Security Affairs

The emails were disguised to look as if they come from the Central Bank of Russia and FinCERT, the Financial Sector Computer Emergency Response Team. All messages sent via email contain FinCERT’s electronic signature.”. Group-IB TDS (Threat Detection System) detected both phishing campaigns and signaled about the malicious activity.

article thumbnail

Malware researcher reverse engineered a threat that went undetected for at least 2 years

Security Affairs

The full path took me about hours work and the sample covers many obfuscation steps and implementation languages. During the analysis time, only really few Antivirus (6 out of 60) were able to “detect” the sample. What is interesting about this new stage is in the way it reflects the old code. reg) analysis program.