article thumbnail

How You Can Start Learning Malware Analysis

Lenny Zeltser

Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. Understand Where You Currently Fit Into the Malware Analysis Process. I like grouping them in 4 categories, which I detailed in the post Mastering 4 Stages of Malware Analysis.

Metadata 145
article thumbnail

Video Conferencing Apps Sometimes Ignore the Mute Button

Schneier on Security

A Privacy Analysis of Mute Buttons in Video Conferencing Apps “: Abstract: In the post-pandemic era, video conferencing apps (VCAs) have converted previously private spaces — bedrooms, living rooms, and kitchens — into semi-public extensions of the office. New research: “ Are You Really Muted?:

Paper 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attackers abused cloud video platform to inject an e-skimmer into 100 Real Estate sites

Security Affairs

Threat actors used an unnamed cloud video platform to install an e-skimmer on more than 100 real estate websites belonging to the same parent company. Researchers from Palo Alto Networks documented a supply chain attack in which the attackers abused a cloud video platform to inject an e-skimmer hidden into video.

Cloud 103
article thumbnail

An RCE in Annke video surveillance product allows hacking the device

Security Affairs

Researchers from Nozomi Networks discovered a critical vulnerability that can be exploited to hack a video surveillance product made by Annke. The vulnerability, tracked as CVE-2021-32941 can be exploited by an attacker to hack a video surveillance product made by Annke, a provider of home and business security solutions.

article thumbnail

3CX voice and video conferencing software victim of a supply chain attack

Security Affairs

Popular voice and video conferencing software 3CX was the victim of a supply chain attack, SentinelOne researchers reported. As of Mar 22, 2023, SentinelOne observed a spike in behavioral detections of the 3CXDesktopApp, which is a popular voice and video conferencing software product.

article thumbnail

Stealing videos from VLC

Security Affairs

Technical analysis: Let’s assume a scenario where Bob & Alice are sharing a video over the WiFi using vlc-iOS, Eve could perform this attack by crawling the source IP address of Bob which would list the URL’s of the videos shared between Bob & Alice. Pierluigi Paganini. SecurityAffairs – VLC, hacking).

article thumbnail

Analysis: Huawei 5G Dilemma

Data Breach Today

Plus: An update on a mobile app exposing infant photos and videos online and an analyst's take on the future of deception technology. The latest edition of the ISMG Security Report discusses why Britain is struggling to determine whether to use China's Huawei technology in developing its 5G networks.

Security 107