Category: Security Blog G Data Software AG

Harmful Logging – Diving into MassLogger

Read the original article: Harmful Logging – Diving into MassLogger There are many things that can be logged on a computer. While not all logging data is useful for the average user, a lot of logging goes on in the…

Harmful Logging – Diving into MassLogger

Read the original article: Harmful Logging – Diving into MassLogger There are many things that can be logged on a computer. While not all logging data is useful for the average user, a lot of logging goes on in the…

Flipper Zero – Tamagochi For Hackers

Read the original article: Flipper Zero – Tamagochi For Hackers This article is about Pavel Zhovner’s latest invention – the Flipper Zero. This small tool could be the go-to device for pentesters all over the world. While we focussed this…

Flipper Zero – Tamagochi For Hackers

Read the original article: Flipper Zero – Tamagochi For Hackers This article is about Pavel Zhovner’s latest invention – the Flipper Zero. This small tool could be the go-to device for pentesters all over the world. While we focussed this…

Optimizing Edge Existence Checks on Supernodes

Read the original article: Optimizing Edge Existence Checks on Supernodes When operating on graphs, one very simple question emerges frequently: Is there a connection between two vertices? Does Tom know Jerry? While this looks like an easy question to answer…

Dumping COVID-19.jar with Java Instrumentation

Read the original article: Dumping COVID-19.jar with Java Instrumentation There is a generic and easy way to unpack Java malware that is not well-known yet. For demonstration I use a recent JAR malware sample that jumps on the COVID-19 bandwagon.…

Netwire RAT via paste.ee and MS Excel to German users

Read the original article: Netwire RAT via paste.ee and MS Excel to German users G DATA discovered an email spam campaign in Germany that delivers NetWire RAT via PowerShell in Excel documents. The emails mimick the German courier, parcel and…

Current Use of Virtual Machine Detection Methods

Read the original article: Current Use of Virtual Machine Detection Methods A common approach to analyse potentially malicious software is dynamic analysis in a virtual machine. Therefore, malware authors use techniques to alter the malware’s behavior when being run in…

“Investing in new technologies has paid off.”

Read the original article: “Investing in new technologies has paid off.” With G DATA Internet Security, users are well protected against cyber-attacks. This is confirmed by current tests by the two independent test institutes AV-Test and AV-Comparatives. We spoke to…

“Investing in new technologies has paid off.”

Read the original article: “Investing in new technologies has paid off.” With G DATA Internet Security, users are well protected against cyber-attacks. This is confirmed by current tests by the two independent test institutes AV-Test and AV-Comparatives. We spoke to…

Security awareness is not a waste of time

Many IT managers in companies rely on security awareness training to make employees pay attention to IT security. The measure has as many advocates as it has critics that oppose it. The latter can’t see the point of or has…

Pekraut – German RAT starts gnawing

Feature-rich remote access malware Pekraut emerges. The rodent seems to be of German origin and is ready to be released. We analyzed the malware in-depth.   Advertise on IT Security News. Read the complete article: Pekraut – German RAT starts…

Classified data at discount prices

Time and again, hard drives, patient records and HR information end up where they do not belong: in the bin. We have examined a case where classified data was still present on a decommissioned notebook computer of the German Army.…

dispelling preconceptions by talking to presales

A company is no longer satisfied with its current IT security solution. And yet they shy away from switching providers. But doing so is easier than they think. The Presales Consultants at G DATA CyberDefense have the right answers to…

Changing passwords regularly damages security

There’s a saying that you should treat passwords like your underwear – change them regularly and don’t share them with others. However, opposition to this has been building for some time now. Changing passwords regularly doesn’t improve security – quite…

Bitbucket Abused as Malware Slinger

Public source code repository at Bitbucket.org was as abused to host CryptBot, Buer loader with NuclearBot and Cryptominer.   Advertise on IT Security News. Read the complete article: Bitbucket Abused as Malware Slinger

this path will not be easy…

Updates are essential for the security of Android devices. However, given the different operating system versions, it is difficult to keep track. We shed light on the version labyrinth and provide tips to improve security.   Advertise on IT Security…

it could be this easy…

The situation with security for smartphones using the Android operating system is improving – albeit very slowly. A major reason for this is the large variety of versions used. In a two-part series, we highlight the current problems and give…