Technology Bytes went off the air 2 years ago. Join us for a memorial geek gathering in honor of this occasion. We will be meeting at our old hangout, Khon’s Wine Darts And Coffee located at 2808 Milam. There’s plenty of free parking and Khon’s offers a great beer and wine selection with many… Continue reading Technology Bytes Post-Mortem Meetup – Friday, March 1st 2019
Month: February 2019
Attacking Containers and runC
This week a new vulnerability was published (CVE-2019-5736) that highlights everything bad and good about containers. Simply put, this vulnerability can be exploited using an infected container to attack the host. It’s a real world example of a breakout attack that has long been a major concern in virtualized and container environment. Here, the attack… Continue reading Attacking Containers and runC
Trickbot Adds Remote Application Credential-Grabbing Capabilities to Its Repertoire
by Noel Anthony Llimos and Carl Maverick Pascual In November 2018, we covered a Trickbot variant that came with a password-grabbing module, which allowed it to steal credentials from numerous applications. In January 2019, we saw Trickbot (detected as TrojanSpy.Win32.TRICKBOT.AZ and Trojan.Win32.MERETAM.AD) with new capabilities added to its already extensive bag of tricks. Its authors clearly… Continue reading Trickbot Adds Remote Application Credential-Grabbing Capabilities to Its Repertoire
Announcing Trend Micro Security for Microsoft Edge
Browsing the web securely with Microsoft Edge (the browser recommended by Microsoft for Windows 10 users and the default browser in Windows 10 S-mode) is a safer bet than ever before with Trend Micro Security for Microsoft Edge—a unique three-in-one browser extension that provides web threat protection, ad blocking, and password management, all in a… Continue reading Announcing Trend Micro Security for Microsoft Edge
Windows App Runs on Mac, Downloads Info Stealer and Adware
By Don Ladores and Luis Magisa EXE is the official executable file format used for Windows to signify that they only run on Windows platforms, and to serve as a security feature. By default, attempting to run an EXE file on a Mac or Linux OS will only show an error notification. However, we found… Continue reading Windows App Runs on Mac, Downloads Info Stealer and Adware
This Week in Security News: Consumer Data and Malware
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn what security issues and critical threats will impact consumer data this year. Also, learn about a malicious Adobe app targeting macOS systems. Read on: Keys to… Continue reading This Week in Security News: Consumer Data and Malware
Linux Coin Miner Copied Scripts From KORKERDS, Removes All Other Malware and Miners
By Augusto Remillano II and Jakub Urbanec While conducting a routine log check, we noticed an interesting script from one of our honeypots downloading a binary connected to a domain. Upon further analysis, we found the script capable of deleting a number of known Linux malware, coin miners, and connections to other miner services and… Continue reading Linux Coin Miner Copied Scripts From KORKERDS, Removes All Other Malware and Miners
Trend Micro Security’s 2019 Release Protects You Better Than Ever Against Ransomware, Coin-mining, Banking, and E-Commerce Threats
2019 has barely gotten started, but by Q4 of 2018 Trend Micro had already seen a 956% increase in coin-mining malware detections for the year-to-date—right alongside the persistent threat of ransomware and online banking and e-commerce hacks designed to steal your identity or your money. Folks can take heart, however, with the latest release of… Continue reading Trend Micro Security’s 2019 Release Protects You Better Than Ever Against Ransomware, Coin-mining, Banking, and E-Commerce Threats
The Fileless, Non-Malware Menace
There’s an old expression: if it looks like a duck, walks like a duck, and quacks like a duck, then it must be a duck. What happens, though, if the duck in question is malware that doesn’t behave like typical malware? Namely, it doesn’t drop a file on your disk to infect your computer, hijack… Continue reading The Fileless, Non-Malware Menace
Keys to Safeguarding Consumer Data in 2019
Businesses and providers typically collect certain details from their customers in order to support service delivery. This information has always been a top target for hackers, but given the high level and rising sophistication of threats, it’s more imperative than ever to ensure it’s protected. After all, a breach of this information doesn’t just impact the… Continue reading Keys to Safeguarding Consumer Data in 2019