A research that analyzed over 10,000 samples of diverse malicious software written in JavaScript concluded that roughly 26% of it is obfuscated to evade detection and analysis. Obfuscation is when ...
A stealthy Python-based backdoor framework capable of long-term surveillance and credential theft has been identified ...
An effort to reverse-engineer malicious AppleScript has led to the creation of a tool to analyze run-only malware targeting the Mac operating system, undermining a common attacker approach to ...
LummaC2, an infostealer malware actively exploiting PowerShell commands, has resurfaced to infiltrate and exfiltrate sensitive data. Discovered by cybersecurity researchers at Ontinue, the malware’s ...
At one point while browsing the web you have probably run into a web site that pretends to be Microsoft or Google stating that something is wrong with your computer and telling you to call a listed ...
[Excerpted from "Malware War: How Malicious Code Authors Battle to Evade Detection," a new, downloadable report available this week on Dark Reading's Advanced Threats Tech Center.] Reverse engineering ...
Reverse engineering and tampering attacks threaten every mobile app, yet many apps apply basic code hardening techniques (or none at all!) to defend against these attempts. In fact, research has shown ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results