article thumbnail

Hackers Are Now Exploiting Windows Event Logs

eSecurity Planet

The system uses DLL (Dynamic Link Library) files to store some resources the application needs and will load automatically. If it does not find one, the encrypted shell code is written in 8KB chunks in the event logs. The attackers used two types of Trojans: HTTP-based Trojan with C2 (command and control) Named-pipe based Trojan.

article thumbnail

Top Open Source Security Tools

eSecurity Planet

It matches reported vulnerabilities to the open source libraries in code, reducing the number of alerts. It has more than 70 extensions, and a knowledge base with more than 14 million open source components. VeraCrypt is free, open source disk encryption software for Windows, Mac OSX and Linux. John the Ripper.

Security 140
article thumbnail

ProtonMail launches Address Verification and full PGP support

Security Affairs

Address Verification allows you to be sure you are securely communicating with the right person, while PGP support adds encrypted email interoperability. When ProtonMail first launched in 2014, our goal was to make email encryption ubiquitous by making it easy enough for anybody to use. Address Verification.