Grinding research finds gold in failed header checks Black Hat Deep Instinct researcher Tom Nipravsky has undermined the ubiquitous security technique of digitally-signed files by baking malicious code into headers without tripping popular security tools.… The Register – Security Secure Hunter Anti -Malware
Tag: Stealthy
Stealthy, Persistent DLL Hijacking Works Against OS X Secure Hunter
Researcher Patrick Wardle of Synack is expected this week at CanSecWest to unveil malicious dylib attacks against Apple’s Mac OS X. Threatpost | The first stop for security news Secure Hunter Anti -Malware
Stealthy malware 'Poweliks' resides only in system registry
A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn. Computerworld Malware and Vulnerabilities News
Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker
Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice. Computerworld Malware and Vulnerabilities News