article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. Microsoft Office Documents. Pdf-parser.

Libraries 103
article thumbnail

Leaked documents from Russian firm NTC Vulkan show Sandworm cyberwarfare arsenal

Security Affairs

Documents leaked from Russian IT contractor NTC Vulkan show it was likely involved in the development of offensive tools. The documents demonstrate that it also developed hacking tools for the Russia-linked APT group Sandworm. The documents include details for three projects named Scan, Amesit, and Krystal-2B.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Watch out! Malware Analysis Sandboxes could expose sensitive data of your organization

Security Affairs

A study conducted by researchers at Cyjax revealed that organizations expose sensitive data via sandboxes used for malware analysis. Experts at the threat intelligence firm Cyjax analyzed file uploaded by organizations via malware analysis sandboxes and discovered that they were exposing sensitive data. ” concludes the company.

article thumbnail

Integral Workflow Automation Tools to Propel Document Imaging Demand, Finds FMI

Info Source

In line with a paradigm shift of business industry towards a paperless ecology, the global document imaging market generated revenues worth US$ 70 Bn in 2018. Key Takeaways – Document Imaging Market Study. The shift of users from manual to automated workflow is boosting demand for document imaging software.

article thumbnail

Personal Data and docs of Swiss town Rolle available on the dark web

Security Affairs

Documents and personal details of residents of the small Swiss town Rolle, on the shores of Lake Geneva, were stolen in a ransomware attack. The threat actors compromised some administrative servers and exfiltrated sensitive documents. The threat actors compromised some administrative servers and exfiltrated sensitive documents.

article thumbnail

Analyzing attacks conducted by North Korea-linked ARCHIPELAGO APT group

Security Affairs

Google’s Threat Analysis Group (TAG) warns of a North Korea-linked cyberespionage group tracked as ARCHIPELAGO. ” reads the analysis published by Google TAG. At the time, the attackers sent phishing emails with a link that directed recipients to a lure document that prompted users to install the malicious Chrome extension.

article thumbnail

The evolution of Africa’s printing industry in 2024 and beyond

Info Source

While we forecast positive growth for many segments and territories across Africa, it is the performance of the South African market that casts a shadow across the continent’s document capture and printing markets. Eskom’s continued woes, with no end in sight for load shedding, continue to dampen the growth of South Africa’s economy.