Tag: Malware

How can an attacker execute malware through a script?

Over the last four years, the share of script-based attacks of malware…

Stephanie Adlam Stephanie Adlam

PUABundler:Win32/CandyOpen (PUA OpenCandy)

PUABundler:Win32/CandyOpen (or OpenCandy) is an unwanted program that acts as a browser…

Stephanie Adlam Stephanie Adlam

Hellminer.exe Coin Miner

Hellminer.exe is a process you can see in the Task Manager that…

Stephanie Adlam Stephanie Adlam

rsEngineSvc.exe Process: Reason Core Security Engine Service

RsEngineSvc.exe is an executable file associated with RAV Antivirus, a program developed…

Stephanie Adlam Stephanie Adlam

AcroTray.exe

The Acrotray.exe process is one of the important components provided by Adobe…

Stephanie Adlam Stephanie Adlam

Malware vs Virus

It is particularly easy to hear people calling the same thing malware…

Stephanie Adlam Stephanie Adlam

Program:Win32/Uwamson.A!ml

Win32/Uwamson.A!ml is a specific name of a Microsoft Defender detection. This designation…

Stephanie Adlam Stephanie Adlam

VirTool:Win32/DefenderTamperingRestore

VirTool:Win32/DefenderTamperingRestore is the name of the Microsoft Defender detection of a malicious…

Stephanie Adlam Stephanie Adlam

Infostealers Made With Electron On The Rise

AhnLab Security Intelligence Center (ASEC) has identified a new strain of Infostealer…

Stephanie Adlam Stephanie Adlam

GitHub and GitLab CDNs Abused to Spread Malware

Recent research around new spreading approaches of one stealer malware family revealed…

Stephanie Adlam Stephanie Adlam

OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes

Microsoft security blog reports that the OpenMetadata platform has critical vulnerabilities that…

Stephanie Adlam Stephanie Adlam