https://research.checkpoint.com/beware-bashware-new-method-malware-bypass-security-solutions/
TL;DR: WSL (Windows Subsystem for Linux) can be a new vehicle for injecting malwares ("Bashwares") and it can be actived even if the user didn't.
Tags: #windows #security #malware #wsl
TL;DR: WSL (Windows Subsystem for Linux) can be a new vehicle for injecting malwares ("Bashwares") and it can be actived even if the user didn't.
Tags: #windows #security #malware #wsl
Check Point Research
Beware of the Bashware: A New Method for Any Malware to Bypass Security Solutions - Check Point Research
With a growing number of cyber-attacks and the frequent news headlines on database breaches, spyware and ransomware, quality security products have become a commodity in every business organization. Consequently a lot of thought is being invested in devising…
http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html
The official post (with a complete analysis) from the company which discovered CCleaner threat.
Tags: #security #malware
The official post (with a complete analysis) from the company which discovered CCleaner threat.
Tags: #security #malware
Cisco Talos Blog
CCleanup: A Vast Number of Machines at Risk
Update 9/18: CCleaner Cloud version 1.07.3191 is also reported to be affected
Update 9/19: This issue was discovered and reported by both Morphisec and Cisco in separate in-field cases and reported separately to Avast.
Update 9/19: There has been some confusion…
Update 9/19: This issue was discovered and reported by both Morphisec and Cisco in separate in-field cases and reported separately to Avast.
Update 9/19: There has been some confusion…
https://arstechnica.com/information-technology/2018/07/rash-of-fortnite-cheaters-infected-by-malware-that-breaks-https-encryption/
Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
Ars Technica
Rash of Fortnite cheaters infected by malware that breaks HTTPS encryption
Malware can read, intercept, or tamper with the traffic of any HTTPS-protected site.