malware detection
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/26142440/malware-green-1500-400x200.webp)
Malware peddlers experimenting with BPL sideloading and masking malicious payloads as PGP keys
A newly spotted campaign is leveraging BPL sideloading and other uncommon tricks to deliver the IDAT Loader (aka HijackLoader) malware and prevent its detection. The campaign …
![AWS](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/12155825/aws-1500-cloud-400x200.webp)
AWS unveils new and improved security features
At its annual re:Inforce conference, Amazon Web Services (AWS) has announced new and enhanced security features and tools. Additional multi-factor authentication option To …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/11083747/malware-1500-400x200.webp)
The most prevalent malware behaviors and techniques
An analysis of 100,000+ Windows malware samples has revealed the most prevalent techniques used by malware developers to successfully evade defenses, escalate privileges, …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/11083747/malware-1500-400x200.webp)
Keyloggers, spyware, and stealers dominate SMB malware detections
In 2023, 50% of malware detections for SMBs were keyloggers, spyware and stealers, malware that attackers use to steal data and credentials, according to Sophos. Attackers …
![snake, threat](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/21113121/snake-coiled-400x200.jpg)
Turla’s Snake malware network disrupted by Five Eyes’ authorities
The US Justice Department announced the completion of court-authorized operation MEDUSA, to disrupt a global peer-to-peer network of computers compromised by sophisticated …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19093544/fighter-brain-tech-400x200.jpg)
Malware and machine learning: A match made in hell
We’ve been developing machine learning-based cybersecurity systems for many years and began developing automation for analysis in our labs in 2005. These early …
![malware analysis tools](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/19153941/malware-analysis-tools-hns-400x200.jpg)
7 open-source malware analysis tools you should try out
There are two main types of malware analysis: static and dynamic. Performing static analysis of a malicious binary means concentrating on analyizing its code without executing …
![brute ratel c4](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/07164844/brute-ratel-c4_hns-400x200.jpg)
Threat actors exchange beacons for badgers to evade endpoint security
Unidentified cyber threat actors have started using Brute Ratel C4 (BRc4), an adversary simulation tool similar to Cobalt Strike, to try to avoid detection by endpoint …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101639/connection-400x200.jpg)
Network attacks increased to a 3-year high
In this video for Help Net Security, Corey Nachreiner, CSO at WatchGuard Technologies, gives a high-level summary of the Internet Security Report for Q4 2021, which revealed …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19133655/malware-skull-red-400x200.jpg)
Detect and identify IoT malware by analyzing electromagnetic signals
Electromagnetic (EM) emanations can be recorded and used to detect and identify malware running on IoT devices, a group of researchers working at IRISA have proven. The setup …
![python pi](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/22131620/python-pi-400x200.jpg)
Malicious Python packages employ advanced detection evasion techniques
JFrog researchers have discovered 11 malicious Python packages on PyPI, the official third-party package repository for Python, which have been collectively downloaded over …
![npm](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/17133051/npm-shield-1200-hns-400x200.jpg)
GitHub fixed serious npm registry vulnerability, will mandate 2FA use for certain accounts
GitHub has fixed a serious vulnerability that would have allowed attackers to publish new, malicious versions of any existing package on the npm registry. About the fixed …