
Pekraut - German RAT starts gnawing
Feature-rich remote access malware Pekraut emerges. The rodent seems to be of German origin and is ready to be released. We analyzed the malware in-depth.
Pekraut - German RAT starts gnawing
Feature-rich remote access malware Pekraut emerges. The rodent seems to be of German origin and is ready to be released. We analyzed the malware in-depth.
German Army: Classified data at discount prices
Time and again, hard drives, patient records and HR information end up where they do not belong: in the bin. We have examined a case where classified data was still present on a decommissioned notebook computer of the German Army.
Flattening the curve: How to work from home safely
Amidst fears of the corona virus SARS-CoV-2, more and more companies ask their employees to work from home. We have created a list of useful tips on how to make remote work as safe as possible.
Switching providers made easy - dispelling preconceptions by talking to presales
A company is no longer satisfied with its current IT security solution. And yet they shy away from switching providers. But doing so is easier than they think. The Presales Consultants at G DATA CyberDefense have the right answers to the questions niggling IT managers and will develop a suitable…
Well-disguised attacks: Malware samples threaten PCs and networks every few seconds
Cyber criminals’ targets have not changed in the past year. They are after passwords and confidential data and try to encrypt data and systems. The current Malware Top 10 showing the ten most active malware families indicate how active the attackers have been in 2019.
Presenting a Graph-based User Interface for Malware Analysis at the Global Graph Summit
End of January 2020, the Global Graph Summit took place in Austin TX, USA. The summit is the biggest conference in the world with a focus on graph computation and graph-related technologies. Stefan Hausotte from G DATA presented the work of his team for the second time at the Global Graph Summit.…
Password rules: Changing passwords regularly damages security
There’s a saying that you should treat passwords like your underwear - change them regularly and don't share them with others. However, opposition to this has been building for some time now. Changing passwords regularly doesn't improve security - quite the opposite.
40,000 CryptBot Downloads per Day: Bitbucket Abused as Malware Slinger
Public source code repository at Bitbucket.org was as abused to host CryptBot, Buer loader with NuclearBot and Cryptominer.
Mobile Security - this path will not be easy...
Updates are essential for the security of Android devices. However, given the different operating system versions, it is difficult to keep track. We shed light on the version labyrinth and provide tips to improve security.
Mobile Security - it could be this easy...
The situation with security for smartphones using the Android operating system is improving - albeit very slowly. A major reason for this is the large variety of versions used. In a two-part series, we highlight the current problems and give tips on how to improve the security of the devices.