OUR LATEST RESEARCH
New Malware Targets Financial Data
File Name: cclub14.exe File Size: 1081833 byte Compile Time: 2015-06-17 08:36:37 Sections: 4 Hash MD5: 29cf881ca840424f2dba7c0952a94cfe Hash SHA-1: 85461a14c12a2e3f3f0f1f10a8d68d73e4e891b4 Imphash : 7ee226ca53c7ca1c7999e440384c5b89 Summary: New malware that is not yet detected by most antivirus products was identified and studied [...]
Malware Manual Unpacking – [Custom + UPX]
SHA-1: 1E6CF952D9F0D507A6AA98AD2B3327B83702BC17 Introduction Implementing all sort of methods to bypass anti-virus (AV) scanners and/or to make the analysis of a malware sample a lot harder, at least from a static point of view, is an [...]
Vulnerability discovered in unsupported Cisco Systems VPN Client
Mitre assigned CVE-2015-7600 Introduction An alternative, but no less accurate title to this article would be ‘why you shouldn’t stick with non-supported software’. On the 30th of July 2014, the widely used Cisco Systems VPN [...]
Reducing The Attack Surface: A Human Error Perspective
The efforts required for a successful cyber-attack do not match the efforts that are invested to build a successful business. It only takes one human error to reduce many years of hard work to dust. [...]
Cyber Fighting Power – Who Has The Upper Hand?
Reading through the British Army Military Doctrine manual the other day (as you do!) the concept of Fighting Power in the context of cyber warfare got me thinking. How could a traditional approach from a [...]