Interview on VM Security: “We save our customers hard cash”
If you run hundreds of virtual machines on one server, you need to provide adequate protection. In this interview, Jan Schlemmer from G DATA explains the problems and solutions.
Interview on VM Security: “We save our customers hard cash”
If you run hundreds of virtual machines on one server, you need to provide adequate protection. In this interview, Jan Schlemmer from G DATA explains the problems and solutions.
Vulnerability in WhatsApp: Targeting human rights activists
According to his own statements, a London human rights lawyer has become the target of an attack with an espionage tool. A security vulnerability in Whatsapp made it possible to taget data on a compromised device.
Strange Bits: HTML Smuggling and GitHub Hosted Malware
Sometimes we see odd stuff, like malware that employs a technique called "HTML Smuggling". Also, malware on GitHub seems to be a thing these days.
IoT security flaws: 2 Million devices affected
More than two million IoT devices are affected by a current vulnerability. This enables attackers to take control over webcams and other affected devices. At the moment, no fix is in sight.
HowTo: Combine Graylog and AlertManager
Are you using Graylog and would like to handle alerts with help from Prometheus AlertManager? No problem, we got a solution for you!
Graph databases: Bad neighborhoods, parents and machine learning
This is the final post in our graph database series, where we introduce a classification algorithm that operates on a graph. Within it, we give a high level description of the algorithm and we point out some general steps that can be carried to conceptually improve the overall performance.
Native single-binary with .Net Core 3.0 and Azure Pipeline
How to create an native single-binary executable for Windows and Linux with C#, .Net Core 3.0 preview and Azure Pipelines.
GarrantyDecrypt Ransomware poses as EnigmaSoft's SpyHunter
A new ransomware variant discredits EnigmaSoft by pretending to be SpyHunter. The ransom message reads like mockery. Some of the encrypted files might be recoverable.
Paliz, the PowerShell downloader in a ZIP and beyond
Threat actors regularly come up with new techniques for malware downloaders to hide and execute their code with the expectation that they can fool antivirus solutions for some time. Paliz is an archive that carries malicious code in an unusual location.
Crypto-Mining: Crypto-mining: eco and G DATA develop rules for the game
If your laptop fan is running at full speed or your smartphone battery is rapidly depleting, crypto malware may be to blame. Together with partners from eco competence group Abuse, G DATA has developed proposals on how crypto mining can actually be used for the benefit of users.