Remove 2020 Remove Blog Remove Malware Remove Network
article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This ancient technique has found its place in the world of malware, namely hiding malicious code within other files including image formatted files ( T1027.003 ). This blog takes a look at the latter technique in recent cryptojacking activity from a group known as WatchDog. Steg malware is uncommon relative to other malware.

Malware 96
article thumbnail

Agentless Workload Scanning Gets Supercharged with Malware Scanning

Prisma Clud

Using WildFire in 2021 to analyze malicious files, our threat research team discovered a 73% increase in Cobalt Strike malware samples compared to 2020. The speed, volume and sophistication of modern malware attacks has made them more difficult to detect.

Malware 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2020-0787.

Malware 74
article thumbnail

Solorigate: SolarWinds Orion Platform Contained a Backdoor Since March 2020 (SUNBURST)

Tenable

Dustin Volz (@dnvolz) December 13, 2020. Kim Zetter (@KimZetter) December 14, 2020. New Blog from us at FireEye: Writeup of UNC2452, a highly sophisticated attacker who distributed malware via a software supply chain attack. Ben Read (@bread08) December 14, 2020. FireEye refers to the backdoor as "SUNBURST.".

Security 118
article thumbnail

Palo Alto Networks a Leader in Forrester Enterprise Firewalls Report

Palo Alto Networks

Forrester has named Palo Alto Networks a Leader in its Forrester Wave : Enterprise Firewalls, Q3 2020 report. Today, the efficacy of our Next-Generation Firewalls is evident in the trust placed in Palo Alto Networks by 70,000 customers in more than 150 countries. . The 70+ innovative new capabilities in PAN-OS 10.0

article thumbnail

Government Advisories Warn of APT Activity Resulting from Russian Invasion of Ukraine

Tenable

The tactical information shared in this blog is designed to help you prepare your digital response to these rapidly unfolding events. CVE-2020-0688. CVE-2020-4006. CVE-2020-5902. CVE-2020-14882. This blog post was published on February 24 and reflects VPR at that time. CVE-2020-0688. CVE-2020-17144.

article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

critical infrastructure through exploitation of known vulnerabilities Background On February 8, Fortinet published an advisory (FG-IR-24-015) to address a critical flaw in FortiOS, its network operating system. CVE Description CVSSv3 Severity CVE-2024-21762 Fortinet FortiOS Out-of-bound Write Vulnerability in sslvpnd 9.6

Malware 121