Wasted locker Evasion Technique

As time goes ... One after another Ransomware come and goes. Like we say it's summer.. winter.. Rainy.. Spring seasons.. Once released it's been a talk of town and one…

Iran APT34 poisoned DOH for exploit

An Iranian hacking group known as Oilrig has become the first publicly known threat actor to incorporate the DNS-over-HTTPS (DoH) protocol in its attacks. Oilrig operators began using a new…

Taidoor Strains seen again

Three agencies of the US government have published today a joint alert alerting US private entities about new versions of Taidoor, a malware family previously associated with Chinese state-sponsored hackers.…

Defender hijacks host files now ..

The native antivirus client of the Windows 10 operating system, Microsoft Defender, has started to flag the hosts file on the system as malicious if it contains redirects for certain…

Project Zero ! 2020-H1 Detection

Google's Project Zero security team, there have been 11 zero-day vulnerabilities exploited in the wild in the first half of the year. 2020 H1 ZERO-DAYS 1. Firefox (CVE-2019-17026) This zero-day…

Script Attacks.. Encyclopaedia

Attackers always seek out new ways to evade detection. As most endpoint security products handle file-based attacks relatively well, scripts are an excellent way for attackers to avoid making changes…