Book Recommendation: Cyberdanger
Famous German publisher Springer launched ‘Cyberdanger’ worldwide, a book written by Eddy Willems, G DATA’s Security Evangelist.
Book Recommendation: Cyberdanger
Famous German publisher Springer launched ‘Cyberdanger’ worldwide, a book written by Eddy Willems, G DATA’s Security Evangelist.
Analysis: Server-side polymorphism & PowerShell backdoors
Malware actors very rarely stick to the same script for extended periods of time. They constantly modify and update their attack methods. Recently we have observed malware that uses server-side polymorphism to hide its payload, which consists of a backdoor fully written in PowerShell.
Strange Bits: Skull and Crossbones, Bloated Malware, and All-In-One Solution for Ransomware
The third part of the StrangeBits series has the ultimate solution for ransomware, explains why some malware is bloated and looks into a supposedly new skulls and bones malware infection.
New record in 2019: Emotet now has over 30.000 variants and counting
More than 200 new versions per day - the creators of the Emotet Trojan are responsible for the most productive cyber crime campaign currently running. G DATA has discovered more versions in the first half of 2019 than in the whole of 2018.
Strange Bits: Sodinokibi Spam, CinaRAT, and Fake G DATA
In the second part of our Strange Bits series we are taking a closer look at Sodinokibi Spam E-Mails, CinaRAT and a Malware that tries to imitate G DATA.
IoT security flaws: 2 Million devices affected
More than two million IoT devices are affected by a current vulnerability. This enables attackers to take control over webcams and other affected devices. At the moment, no fix is in sight.
Distributing Malware - one "Word" at a Time
Using Microsoft Word to distribute malware is a common tactic used by criminals. Given the popularity of Word, criminals can often "live off the land" and use mechanisms that are already in place to do their dirty work.
Emotet: G DATA explains cybercrime's all-purpose weapon
No other malware-family is as penetrating and has been in development as long as Emotet. The malware has already caused millions in damage in companies around the world. We explain what Emotet can do and why it is so dangerous.
Predictions 2019: "The era of simple Android malware is over"
Whether on smartphones, desktop computers, crypto currencies or websites - IT security is becoming increasingly important for end-users. We give an outlook on the most important trends for the year 2019.
Captchas are dead...ish.
According to a recently published research paper, some types of Captchas are now obsolete. The reason: machines have learned to solve those Captchas.