article thumbnail

Role of Context in Threat Detection

Anton on Security

The debate focused on the role of context in threat detection. Specifically, it is about the role of local context (environment knowledge, organization context, site details, etc) in threat detection. Can threat detection work well without such local context? Now, some of you will say “yes, of course!”

article thumbnail

Virus Retreat: November Sees 18% Drop in Threats Detected by Dr.Web

Penetration Testing

In the ever-evolving landscape of cybersecurity, Doctor Web’s November 2023 virus activity review offers an intriguing glimpse into the shifting nature of digital threats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside DiceLoader: How FIN7’s Malware Masters Evasion

Penetration Testing

Recently, security researchers from Sekoia TDR (Threat Detection & Research) have delved into the inner workings of DiceLoader malware, shedding light on its functionality, obfuscation techniques, and its role within FIN7’s operations.

Malware 67
article thumbnail

Detection 101: Top Detections for Malware and Ransomware

Digital Shadows

Protection against malware and ransomware requires specific threat detection rules and metrics to measure effectiveness.

Malware 57
article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

article thumbnail

Simplified Security with Purpose-Built Networking for Advanced Threat Detection

Cisco Security

We know that we need to take a platform approach to integrate our security solutions , so that we can improve detection and automate our response , if we want to stay ahead of the malware economy. I mean, if you haven’t noticed, the arms race in network security is heating up, and threat actors are well motivated to win. .

article thumbnail

Russia-linked hackers target Ukrainian military with Infamous Chisel Android malware

Security Affairs

Russia-linked threat actors have been targeting Android devices of the Ukrainian military with a new malware dubbed Infamous Chisel. The GCHQ’s National Cyber Security Centre (NCSC) and agencies in the United States, Australia, Canada, and New Zealand have published an analysis of the Android malware.

Malware 110