Topics
Events
Podcasts
Research
Recognition
Leadership
About CRA
Malware

SC Media’s 30th Anniversary – Then and Now: Malware

Doug OlenickAugust 26, 2019
Doug Olenick
Doug Olenick

Related

Vulnerability management
7″ Laptop, Trojans in Chips, Samsung’s Faux Moon, & The 4 C’s – PSW #777

March 22, 2023

In the Security News: Windows MSI tomfoolery, curl turns 8...point owe, who doesn't need a 7" laptop, glitching the ESP, your image really isn't redacted or cropped, brute forcing pins, SSRF and Lightsail, reversing D-Link firmware for the win, ICMP RCE OMG (but not really), update your Pixel and Samsung, hacking ATMs in 2023, breaking down Fortine...
Threat intelligence
Novel malware distribution techniques leveraged by North Korean hackers

SC StaffMarch 23, 2023

Numerous file formats are being leveraged by North Korean advanced persistent threat group APT37, also known as Reaper, RedEyes, Scarcruft, and Ricochet Chollima, to facilitate malware distribution efforts, reports The Hacker News.

Malware
Linux SSH servers targeted by novel ShellBot malware variants

SC StaffMarch 22, 2023

Mismanaged Linux SSH servers are being subjected to a new attack campaign involving the distribution of three new strains of the ShellBot DDoS bot malware, including PowerBots GohacK, LiGhT's Modded perlbot v2, and DDoS PBot v2.0, according to The Hacker News.

Related Events

  • Cybercast
    EMOTET Exposed: Inside the Cybercriminals’ Supply Chain

    On-Demand Event

  • eSummit
    Email Emergency: Steering Clear of Phishing and BEC Scams

    On-Demand Event

  • eSummit
    Ransomware & Data Exfiltration: A survival guide to prevention & response

    On-Demand Event

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.