article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. What’re malicious files?

Libraries 103
article thumbnail

Tenable experts found 15 flaws in wireless presentation systems

Security Affairs

Experts at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, including flaws that can be exploited to remotely hack devices. Wireless presentation systems are used to display content on a screen or through several devices, including mobile devices and laptops. ” reads the analysis published by Tenable.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts spotted a variant of the Agenda Ransomware written in Rust

Security Affairs

The ransomware was originally written in Go language and was employed in attacks aimed at healthcare and education sectors in countries like Thailand and Indonesia. ” reads the analysis published by Trend Micro. This tactic also allows for avoiding detections based on the analysis of read/write file operations.

article thumbnail

Ethical Problems in Computer Security

Schneier on Security

Our vision is for this work to be broadly useful to the computer security community, including to researchers as they embark on (or choose not to embark on), conduct, and write about their research, to program committees as they evaluate submissions, and to educators as they teach about computer security and ethics.

article thumbnail

HackerGPT 2.0 Unveils New AI Cyber Defense Strategies

eSecurity Planet

Sample HackerGPT scanning results Query Functions in HackerGPT HackerGPT provides a range of query functions such as network hacking, mobile hacking, payload creation, attack vector analysis, and vulnerability assessment. However, users may require some level of knowledge depending on their query to fully utilize its capabilities effectively.

article thumbnail

North Korea-linked BlueNoroff APT is behind the new RustBucket Mac Malware

Security Affairs

The attribution to the BlueNoroff APT is due to the similarities in the findings that emerged from Kaspersky’s analysis published in December 2022. “When the Internal PDF Viewer application is launched, the user is presented with a PDF viewing application where they can select and open PDF documents.

article thumbnail

GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

The Last Watchdog

They presented LPAuditor, a tool to conduct “a comprehensive evaluation of the privacy loss caused by publicly available location metadata.” The consensus used to be that if the data is scrubbed, it can’t be used to identify individuals, and is hence suitable for analysis and marketing.

Metadata 218