TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware
Malware authors use various techniques to obfuscate their code and protect against reverse engineering. Techniques such as control flow obfuscation
Malware authors use various techniques to obfuscate their code and protect against reverse engineering. Techniques such as control flow obfuscation
Shopping online is an increasingly popular endeavor, and it has accelerated since the COVID-19 pandemic. Online sales during the 2021 holiday season
This post was written with contributions from IBM X-Force’s Limor Kessem and Charlotte Hammond. The cyber crime gang that operates the TrickBot
“You won’t know you have a problem unless you go and look.” Neil Wyler, who is known as ‘Grifter’ in the hacker community, made that
Welcome to my latest painting guide! This time I tackle the epic Deadpool and Bob, agent of hydra. This is a superb kit filled with cool features
Welcome to my latest painting guide! This time covering the epic Cable and Domino. I’ve really been looking forward to this pair. Cable is one of
You’d have to look far and wide to find an IT professional who isn’t aware of (and probably responding to) the Log4Shell vulnerability. The
How many times have you heard the popular information security joke: “It’s always DNS”? It means that every time there’s a problem you
In March 2021, IBM Security X-Force observed an attack on an Asian airline that we assess was likely compromised by a state-sponsored adversary using
IBM Security X-Force has observed a state-sponsored adversary using a new backdoor that utilizes Slack to attack airline organizations. The adversary
IBM Security X-Force has observed a state-sponsored adversary using a new backdoor that utilizes Slack to attack airline organizations. The adversary
If you hadn’t heard of Apache Log4j, chances are it’s on your radar now. In fact, you may have been using it for years. Log4j is a logging
If you hadn’t heard of Apache Log4j, chances are it’s on your radar now. In fact, you may have been using it for years. Log4j is a logging
MITIGATION UPDATE: You must upgrade to 2.16 to mitigate this vulnerability. Do NOT enable JNDI in 2.16. Follow:
MITIGATION UPDATE: You must upgrade to 2.17 to mitigate CVE-2021-45105 if you use Java 8. You must upgrade to 2.16 to mitigate CVE-2021-44228 if you