PurpleFox Adds New Backdoor That Uses WebSockets

Trend Micro – Trend Micro – PurpleFox Adds New Backdoor That Uses WebSockets Cyber Threats In September 2021, the Trend Micro Managed XDR (MDR) team looked into suspicious activity related…

This 'particularly dangerous' phishing attack features a weaponized Excel file

A new phishing campaign is targeting employees in financial services using links that download what is described as a ‘weaponized’ Excel document.  The phishing campaign, dubbed MirrorBlast, was detected by…

TrickBot Gang Enters Cybercrime Elite with Fresh Affiliates

The group – which also created BazarLoader and the Conti ransomware – has juiced its distribution tactics to threaten enterprises more than ever. The cybercriminals behind the infamous TrickBot trojan…

Explosive New MirrorBlast Campaign Targets Financial Companies

Key Points:  Morphisec Labs tracked a new MirrorBlast campaign targeting financial services organizations  MirrorBlast is delivered via a phishing email that contains malicious links which download a weaponized Excel document…

Windows security: 20 years on from Bill Gates' Trustworthy Computing memo, how much has changed?

It’s almost 20 years since then-Microsoft boss Bill Gates wrote his famous Trustworthy Computing memo, in which he urged the company to produce more secure software.  “Eventually, our software should…

The King is Dead, Long Live MyKings! (Part 1 of 2)

Avast –  Avast –  MyKings is a long-standing and relentless botnet which has been active from at least 2016. Since then it has spread and extended its infrastructure so much…

Excel 4.0 Macros Will Be Disabled in Order to Protect Users

The macros that will be disabled by default are found in Microsoft 365. The company is aiming to protect its customers from malicious documents by taking this action. What Are…

Email Phishing and Malware | Bitdefender Earns Top Marks in VBSpam Test

Bitdefender has once again earned the top ranking for email phishing, malware and spam removal from the premiere online publication for anti-virus information and resources, Virus Bulletin. Virus Bulletin regularly…

PowerShell Obfuscation

Topics: AMSI | Layer 0 Obfuscation | Breaking Down a Reverse Shell | Stepping Into the Gauntlet | Invoke-PSObfuscation.ps1 | Wrapping Up | Resources This blog post was originally published…

Binary Reuse of VB6 P-Code Functions

Avast –  Avast –  Reusing binary code from malware is one of my favorite topics. Binary re-engineering and being able to bend compiled code to your will is really just…