Remove Computers and Electronics Remove Information Security Remove Malware Remove Penetration Testing
article thumbnail

Malware Training Sets: FollowUP

Security Affairs

The popular expert Marco Ramilli provided a follow up to its Malware classification activity by adding a scripting section which would be useful for several purposes. On 2016 I was working hard to find a way to classify Malware families through artificial intelligence (machine learning).

Malware 71
article thumbnail

Scraping the TOR for rare contents

Security Affairs

Cyber security expert Marco Ramilli explains the difficulties for scraping the ‘TOR networks’ and how to enumerate hidden-services with s crapers. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is Emotet gang targeting companies with external SOC?

Security Affairs

Cybercrime gang behind the Emotet malware is targeting organization with external SOC with emails claiming to deliver a SOC “weekly report.”. The group behind Emotet malware is getting smarter and smarter in the way the y deliver such a Malware. I am a computer security scientist with an intensive hacking background.

article thumbnail

From Targeted Attack to Untargeted Attack

Security Affairs

Today I’d like to share an interesting and heavily obfuscated Malware which made me thinking about the meaning of ‘Targeted Attack’ Nowadays a Targeted Attack is mostly used to address state assets or business areas. It looks like a romantic Emotet according to many Antivirus so I wont invest timing into this well-known Malware.

article thumbnail

University, Professional Certification or Direct Experience?

Security Affairs

I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna. I do have experience on security testing since I have been performing penetration testing on several US electronic voting systems.

article thumbnail

OilRig APT group: the evolution of attack techniques over time

Security Affairs

T1388) , from group_b to group_d time frames OilRig used real Compromised User Accountsextracted by Malware (rif. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna.

article thumbnail

TA505 Cybercrime targets system integrator companies

Security Affairs

The two Macros decoded a Javascript payload acting as a drop and execute by using a well-known strategy as described in: “ Frequent VBA Macros used in Office Malware ”. The TA505 group , that is known to have operated both the Dridex and Locky malware families, continues to make small changes to its operations. 66.133.129.5)