Three Essential Strategies for ECommerce Companies

Effective online security in ecommerce is crucial not just for protecting against data breaches, but also for building and maintaining trust between businesses and consumers. When customers feel confident that their personal information is safe and secure, they are more likely to engage and establish long-term relationships with brands. On the other hand, a single…

Read More

CheckPoint Releases New Methodologies for Malicious NSIS-Based Packages for AgentTesla, Remcos, and XLoader Malware

Executive Summary CheckPoint Researchers have released new findings detailing new methodologies to unpack malicious Nullsoft Scriptable Install System (NSIS)-based packages, which have been used in attacks propagating from AgentTesla, Remcos, and XLoader malware. The article also introduces NSIXloader, an NSIS-based crypter, and discusses how to create this tool to automatically unpack these samples for further analysis. Community Threat Assessment…

Read More

Cisco Talos Sees New Brand Impersonation Methodologies from Malicious Actors

Executive Summary Cisco Talos has released a report detailing new findings around recent techniques, tactics, and procedures (TTPs) uncovered while investigating brand impersonation email campaigns. In the report, Cisco Talos detailed various novel TTPs used by threat actors to embed brand logos in emails, such as inserting brand-related words into HTML, using base64 encoding, fetching logos from…

Read More

HijackLoader Updated with New Evasion Techniques

On 6 May 2024, Zscaler researchers reported that the prevalent HijackLoader (also known as IDAT Loader) has been updated with new detection and analysis evasion techniques. Context and Technical Details According to Zscaler researchers, “HijackLoader now includes modules to add an exclusion for Windows Defender Antivirus, bypass User Account Control (UAC), evade inline API hooking…

Read More

Novel Botnet Exploiting High Severity Vulnerability in D-Link Devices

On 1 May 2024, Fortinet researchers published the technical details of a new botnet they dubbed “Goldoon” targeting a high severity vulnerability in D-Link devices Context and Technical Details According to researchers, “If a targeted device is compromised, attackers can gain complete control, enabling them to extract system information, establish communication with a C2 server,…

Read More