Obfuscation: There Are Two Sides To Everything

August 1, 2024 at 07:30AM The article explores the topic of obfuscation as a technique used in software protection and how it is also used by malicious software authors to evade detection. It highlights various methods of obfuscation and its impact on detecting and preventing cyber threats. The importance of not relying solely on signature-based … Read more

CISA Warns of Attacks Exploiting Old Oracle WebLogic Vulnerability

June 4, 2024 at 08:39AM CISA added an old Oracle WebLogic vulnerability, CVE-2017-3506, to its list of known exploited vulnerabilities. Chinese hackers have been using it to deploy cryptocurrency miners. Trend Micro reported that a China-based threat group, Water Sigbin, continues to exploit this vulnerability and another recent one. Their advanced techniques make detection and … Read more

Malicious web redirect scripts stealth up to hide on hacked sites

January 22, 2024 at 03:15PM Security researchers discovered the Parrot traffic direction system (TDS) to be rapidly evolving, enhancing its malicious capabilities. Targeting vulnerable WordPress and Joomla sites, it infects and redirects users to malicious locations, with 16,500 websites affected. The TDS operators sell the traffic to threat actors, who profile and redirect users to … Read more