Book Recommendation: Cyberdanger
Famous German publisher Springer launched ‘Cyberdanger’ worldwide, a book written by Eddy Willems, G DATA’s Security Evangelist.
Book Recommendation: Cyberdanger
Famous German publisher Springer launched ‘Cyberdanger’ worldwide, a book written by Eddy Willems, G DATA’s Security Evangelist.
Analysis: Server-side polymorphism & PowerShell backdoors
Malware actors very rarely stick to the same script for extended periods of time. They constantly modify and update their attack methods. Recently we have observed malware that uses server-side polymorphism to hide its payload, which consists of a backdoor fully written in PowerShell.
Strange Bits: Skull and Crossbones, Bloated Malware, and All-In-One Solution for Ransomware
The third part of the StrangeBits series has the ultimate solution for ransomware, explains why some malware is bloated and looks into a supposedly new skulls and bones malware infection.
A deeper dive into the"Silentbruter" malware - Internal folder structures revealed
A malware called "SilentBruter", which is designed to guess login credentials for online accounts, has caught the attention of one of our analysts. In this blogpost we take a closer look at the Silentbruter-Malware and its rather interesting internal structures.
Ransomware identification for the judicious analyst
When facing a ransomware infection, it helps to be familiar with some tools as well as key points to identify ransomware correctly.
Strange Bits: Sodinokibi Spam, CinaRAT, and Fake G DATA
In the second part of our Strange Bits series we are taking a closer look at Sodinokibi Spam E-Mails, CinaRAT and a Malware that tries to imitate G DATA.
Strange Bits: HTML Smuggling and GitHub Hosted Malware
Sometimes we see odd stuff, like malware that employs a technique called "HTML Smuggling". Also, malware on GitHub seems to be a thing these days.
HowTo: Combine Graylog and AlertManager
Are you using Graylog and would like to handle alerts with help from Prometheus AlertManager? No problem, we got a solution for you!
Graph databases: Bad neighborhoods, parents and machine learning
This is the final post in our graph database series, where we introduce a classification algorithm that operates on a graph. Within it, we give a high level description of the algorithm and we point out some general steps that can be carried to conceptually improve the overall performance.
Native single-binary with .Net Core 3.0 and Azure Pipeline
How to create an native single-binary executable for Windows and Linux with C#, .Net Core 3.0 preview and Azure Pipelines.