article thumbnail

Understanding Malware: A Guide for Software Developers and Security Professionals

The Crazy Programmer

Malware or malicious software brings significant threats to both individuals and organisations. It is important to understand why malware is critical for software developers and security professionals, as it helps to protect systems, safeguard sensitive information, and maintain effective operations. What is Malware?

Malware 130
article thumbnail

North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware 

Ooda Loop

ScarCruft, a threat actor linked to North Korea, is being connected to the exploitation of a Windows zero-day. The vulnerability, CVE-2024-38178, is being used to infect devices with RokRAT malware. The exploit is a memory corruption bug that can allow remote code execution. RokRAT can receive and execute commands from […]

Malware 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Russia Targeting Ukrainian Military Recruits With Android, Windows Malware, Google Says

Ooda Loop

The campaign involves getting targets to download malware from a website which hosts anti-mobilization content. Russia has launched a cyber campaign targeting Ukrainian military recruits. Russia has begun a campaign to target Ukrainian military recruits.

Malware 64
article thumbnail

The latest trends in the threat landscape

CIO

Each quarter HP’s security experts highlight notable malware campaigns, trends and techniques identified by HP Wolf Security. Living-off-the-land techniques Many malware campaigns relied on living-off-the-land (LOTL) techniques to help attackers remain undetected by blending in with legitimate system admin activity [7].

Trends 235
article thumbnail

AndroxGhost – the python malware exploiting your AWS keys

Lacework

And the majority of this activity has been linked to the same python malware dubbed AndroxGh0st with at least one incident tied to an actor known as Xcatze. For AWS specifically, the malware scans for and parses AWS keys but also has the ability to generate keys for brute force attacks. AndroxGh0st options.

Malware 145
article thumbnail

6 insights every CIO should take away from the CrowdStrike debacle

CIO

But before we can even get started: It appears that, no matter how appealing the story, Southwest Airlines wasn’t immune to the CrowdStrike bug because its servers run on Windows 3.1. For an in-depth view, see “ No, Southwest Airlines is not still using Windows 3.1 — OSnews.”) Once upon the same time there was malware.

Malware 315
article thumbnail

Unit 42 Discovers First Known Malware Targeting Windows Containers

Palo Alto Networks

The Unit 42 cybersecurity consulting group published research on the first known malware targeting Windows containers, which was discovered by Unit 42 researcher Daniel Prizmant and named Siloscape. Diagram of Windows container (source: Microsoft). In addition to containers, there are clusters. Execution flow of Siloscape.

Malware 93