Remove Blog Remove Malware Remove Research Remove Windows
article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. We did that for different operating systems – for Windows, macOS and Linux. That was the first stage I'd say.”

Malware 82
article thumbnail

AndroxGhost – the python malware exploiting your AWS keys

Lacework

And the majority of this activity has been linked to the same python malware dubbed AndroxGh0st with at least one incident tied to an actor known as Xcatze. For AWS specifically, the malware scans for and parses AWS keys but also has the ability to generate keys for brute force attacks. AndroxGh0st options.

Malware 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Unit 42 Discovers First Known Malware Targeting Windows Containers

Palo Alto Networks

The Unit 42 cybersecurity consulting group published research on the first known malware targeting Windows containers, which was discovered by Unit 42 researcher Daniel Prizmant and named Siloscape. Diagram of Windows container (source: Microsoft). In addition to containers, there are clusters.

Malware 88
article thumbnail

Agentless Workload Scanning Gets Supercharged with Malware Scanning

Prisma Clud

Using WildFire in 2021 to analyze malicious files, our threat research team discovered a 73% increase in Cobalt Strike malware samples compared to 2020. The speed, volume and sophistication of modern malware attacks has made them more difficult to detect.

Malware 76
article thumbnail

3CX Desktop App for Windows and macOS Reportedly Compromised in Supply Chain Attack

Tenable

The information presented in this blog post was current as of March 29. On March 29, a post on the CrowdStrike subreddit revealed that the 3CX desktop app, a softphone client for both Windows and Mac, was compromised and trojanized. Additional changes made after publication can be tracked in the changelog below.

Windows 101
article thumbnail

How Lacework Composite Alerts caught a Windows incident: A detailed walkthrough

Lacework

In this blog, we’ll dive into the techniques that power our Composite Alerts and explore how our threat detection capabilities perform when put to the test. Indicator Removal: Clear Windows Event Logs (T1070.001) Cyberattackers often attempt to erase their tracks by clearing system logs.

Windows 64
article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This ancient technique has found its place in the world of malware, namely hiding malicious code within other files including image formatted files ( T1027.003 ). This blog takes a look at the latter technique in recent cryptojacking activity from a group known as WatchDog. Steg malware is uncommon relative to other malware.

Malware 96