Image Steganography Example: How I Created an Attack
Image steganography attacks are extremely easy to implement with DIY toolkits widely available online, and hundreds of free apps on the market. Anyone with malicious intent has the potential to abuse image steganography and cause damage. Let’s explore how simple it is t...
How Hackers use Image Steganography to Hide Malware and What You can Do to Stop Them
An old-school threat that has reappeared in a more sophisticated form is image steganography. Learn about how image steganography is, how it works, and what can be done to stop it.
Anatomy of a Well-Crafted UPS, FedEx, and DHL Phishing Email During COVID-19
Votiro Head of Engineering for North America dissects an advanced email phishing campaign.
Malware Sandbox Evasion Using VBA Macros: How it Works
A lesser known – but highly effective approach to malware sandbox evasion – is by taking advantage of basic rules of how Visual Basic for Applications (VBA) macros and sandboxes operate. This technique doesn’t require code execution in order to detect the sandbox enviro...
How to Secure Your Client-Facing Portal from Malware
Receiving external files through online portals provides an attack vector for hackers. Every uploaded photo, e-form, or document increases the risk of a malware-infected file entering the company’s network, with disastrous data security consequences.
Ryuk: Everything you need to know about today’s most dangerous ransomware
First discovered in mid-August 2018, Ryuk is a type of ransomware that penetrates a target and uses encryption to block access to files, systems, or networks until a ransom is paid. These ransomware attacks cause significant damage, including data loss, disruption of se...
Coronavirus & Cybersecurity: A Guide for WFH Cybersecurity Ops
In the ongoing bid to curb the coronavirus outbreak, many organizations are allowing or requiring employees to work from home (WFH). in the haste to implement remote working strategies, data security concerns cannot be forgotten. It is vital that precautions intended to...
SHARED INTEL: Bogus Coronavirus email alerts underscore risk posed by weaponized email
It comes as no surprise that top cyber crime rings immediately pounced on the Coronavirus outbreak to spread a potent strain of malware via malicious email and web links.