Tag: threat intelligence
-
How Hackers Avoid Detection using ZIP files
•
A significant part of a cybercriminal’s arsenal of tools and techniques is dedicated to evading detection by security solutions such as firewalls and antiviruses. Depending on the nature of the malware that needs to be delivered, the criminal might pick the most suited method of avoiding detection. ZIP File Concatenation…
-
Winos 4.0: How Gaming Apps can be Used to Infect your Computer
•
Researchers at Fortinet have observed multiple samples of an advanced malware, Winos 4.0, hidden within gaming-related applications such as speed boosters, optimization utilities, and installation tools. Winos is an advanced malware with several components handling distinct functions that collectively give the attacker complete control over the victim’s machine. The malware…