Category: Security Blog G Data Software AG

Reborn in Rust: AsyncRAT

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Reborn in Rust: AsyncRAT

100 Days of YARA: Writing Signatures for .NET Malware

If YARA signatures for .NET assemblies only rely on strings, they are very limited. We explore more detection opportunities, including IL code, method signature definitions and specific custom attributes. Knowledge about the underlying .NET metadata structures, tokens and streams helps…

100 Days of YARA: Writing Signatures for .NET Malware

If YARA signatures for .NET assemblies only rely on strings, they are very limited. We explore more detection opportunities, including IL code, method signature definitions and specific custom attributes. Knowledge about the underlying .NET metadata structures, tokens and streams helps…

Vidar Stealer: Revealing A New Deception Strategy

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Vidar Stealer: Revealing A New Deception Strategy

Smoked out – Emmenhtal spreads SmokeLoader malware

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Smoked out – Emmenhtal spreads SmokeLoader malware

Smoked out – Emmenhtal spreads SmokeLoader malware

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Smoked out – Emmenhtal spreads SmokeLoader malware

Booking a Threat: Inside LummaStealer’s Fake reCAPTCHA

Cybercriminals are taking advantage of the increased demand in travel by setting up fake booking sites, phishing scams and fraudulent listings to trick unsuspecting travelers. This article has been indexed from Security Blog G Data Software AG Read the original…