While well known remote access trojans such as Gh0st, PoisonIvy, Hupigon, and DRAT produce network traffic that is easily detectable, a new family of malware dubbed FAKEM seeks to disguise its presence by making the traffic look like a legitimate proto…
Spam campaign makes offerings to Zeus
The widespread banking trojan/botnet known as Zeus is continuing to throw its malware-infested thunderbolts at unsuspecting users, this time through a wide-net spam campaign.
Shylock malware dials up Skype
The banking trojan known as Shylock is calling up more victims, thanks to a new propagation tactic of using Skype. It’s also added a few new features to worsen the infection.
Credit card-stealing malware infests nearly 100 Zaxby’s chicken restaurants
Hackers have already been shown to have a taste for Subway, but they apparently have a hankering for fried chicken too. A new criminal attack has potentially compromised credit card data at almost 100 locations of Zaxby’s, a Southern, chicken-centric r…
Red October analysis reveals complex, two-stage attack
In the wake of the discovery of Red October, a complex, in-depth cyber-espionage campaign going back at least five years, security researchers have published a comprehensive analysis of the breadth and depth of the operation, uncovering a two-pronged a…
Anonymous Mexico hits defense ministry in support of Zapatistas
South-of-the-border members of the hacktivist collective Anonymous have claimed responsibility for a cyber attack on the Mexican defense ministry that brought down its website temporarily this week.
FireEye adds six new executives to its leadership team
California-based cybersecurity specialist FireEye has added six new members to its global leadership team, the firm recently announced
Performing Clean Active Directory Migrations and Consolidations
Active Directory Migration Challenges
Over the past decade, Active Directory (AD) has grown out of control. It may be due to organizational mergers or disparate Active Directory domains that sprouted up over time, but many AD administrators are now l…
Reduce Risk by Monitoring Active Directory
Active Directory (AD) plays a central role in securing networked resources. It typically serves as the front gate allowing access to the network environment only when presented with valid credentials. But Active Directory credentials also serve to gran…
Adobe patches four exploited ColdFusion flaws
In its own Microsoft-synchronized Patch Tuesday this month, Adobe merely issued an advisory on four known and exploited flaws in ColdFusion. Yesterday it patched them.