Remove Computers and Electronics Remove Cyber Attacks Remove Malware Remove Penetration Testing
article thumbnail

Frequent VBA Macros used in Office Malware

Security Affairs

The malware expert Marco Ramilli collected a small set of VBA Macros widely re-used to “weaponize” Maldoc (Malware Document) in cyber attacks. Here comes the idea to collect a small set of VBA Macros widely re-used to “weaponize” Maldoc (Malware Document) in contemporary cyber attacks.

Malware 72
article thumbnail

Scraping the TOR for rare contents

Security Affairs

Cyber security expert Marco Ramilli explains the difficulties for scraping the ‘TOR networks’ and how to enumerate hidden-services with s crapers. For this post “interesting links” means specific links that are rare or not very widespread and mostly focused on cyber-attacks and/or cyber-espionage.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

University, Professional Certification or Direct Experience?

Security Affairs

Alice knows exactly what cybersecurity defence systems has implemented and she knows eventually her network will be hit by the next cybersecurity attack. However she doesn’t know when the cyber attack will happen, what infrastructures the attacker will hit and what technique the attacker will use (phishing, exploiting, scam, etc).

article thumbnail

Application Security: Complete Definition, Types & Solutions

eSecurity Planet

Web application scanners test your websites and web-facing apps for vulnerabilities. These tests typically use vulnerability scanners. Penetration testing is a similar approach, but typically involves teams of security pros attempting to simulate a cyber attack to identify weaknesses that could be exploited by hackers.

Mobile 85
article thumbnail

Is APT27 Abusing COVID-19 To Attack People ?!

Security Affairs

Today, many reports are describing how infamous attackers are abusing such an emergency time to lure people by sending thematic email campaigns or by using thematic IM within Malware or Phishing links. Following few of them that I believe would be a nice reading: New Cyber Attack Campaign Leverages the COVID-19 Infodemic.

article thumbnail

Iranian Threat Actors: Preliminary Analysis

Security Affairs

Bonupdater, Helminth, Quadangent and PowRuner are some of the most sophisticated Malware attributed to OilRig and analyzed over the past few years. But if you wonder why I decided to keep them separated on such personal and preliminary analysis you could find the answer in the reason in why they do attack. CopyKittens.

article thumbnail

Cyber CEO: The History Of Cybercrime, From 1834 To Present

Herjavec Group

1955 — Phone Hacker — David Condon whistles his “Davy Crockett Cat” and “Canary Bird Call Flute” into his phone, testing a theory on how phone systems work. 1962 — Allan Scherr — MIT sets up the first computer passwords, for student privacy and time limits. It is thought to be the first computer virus. . years of probation.