Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

LinkedIn Jobs, The Malign Effect

February 28, 2019 by Marc Handelman in Information Security, Malware, Malware Detection

Fake Jobs, leading to malware infections, that is. Microsoft Corporation (Nasdaq: MSFT) and it's LinkedIn unit must focus on protecting their product, which of course, are LinkedIn members. Read all about it at Proofpoint and via Graham Cluley writing at BitDefender. H/T

"Since the middle of 2018, Proofpoint has been tracking campaigns abusing legitimate messaging services, offering fake jobs, and repeatedly following up via email to ultimately deliver the More_eggs backdoor." - via the Proofpoint Threat Insight Team, wrtiting at the comapny's blog with the post entitled "Fake Jobs: Campaigns Delivering More_eggs Backdoor via Fake Job Offers"

February 28, 2019 /Marc Handelman
Information Security, Malware, Malware Detection

GrrCon Augusta 2018, Adam Hogan's 'Malware Mitigation Sample Detonation Intelligence Automation: Make Your Binaries Work for You' →

September 23, 2018 by Marc Handelman in Irongeek, Information Security, Education, Conferences, GrrCon Augusta, Malware, Malware Detection

Videography Credit: Irongeek (Adrian Crenshaw).

September 23, 2018 /Marc Handelman
Irongeek, Information Security, Education, Conferences, GrrCon Augusta, Malware, Malware Detection

US District Court Judge To State of Georgia: Bad, Bad, Double-Bad

September 18, 2018 by Marc Handelman in Vulnerable Systems, Vulnerabilities, Malware, Malware Detection, Elections, Election Security, Election Manipulation, Election Fraud, Electioneering

via Cyrus Farivar, writing at Ars Technica, of the apparent displeasure noted by United States District Court Judge Amy Totenberg, whilst Her Honor viewed the shenanigans being perpertrated by the State of Georgia's voting commision. Suprised? Don't be.. The centuries lomg tradition of election manipulations is coming to the fore, as the aft begins sinking under it's own weight of corruption, down south, that is. That said, the North, West and East aren't exactly doing that much better. Read Cyrus's superb reportage and weep for free, unfettered elections.

September 18, 2018 /Marc Handelman
Vulnerable Systems, Vulnerabilities, Malware, Malware Detection, Elections, Election Security, Election Manipulation, Election Fraud, Electioneering

BlueHat IL 2018, Marion Marschalek 's 'The Wolf in SGX Clothing' →

February 07, 2018 by Marc Handelman in Education, Information Security, Malware, Malware Detection, Research, Security Research, BlueHat IL, Conferences
February 07, 2018 /Marc Handelman
Education, Information Security, Malware, Malware Detection, Research, Security Research, BlueHat IL, Conferences

Yes, Virgina, Malicious Advertising Growth in Numbers and Viciousness Is Startling →

February 04, 2018 by Marc Handelman in Malicious Advertising, Malvertising, Malware, Malware Detection, Information Security, Cybersecurity

Dan Goodin, writing at our beloved Ars Technica, reports on the startling large numbers of malicious advertising exploits and the subsequent malevolence of same. Unfortunately, Today's Must Read.

February 04, 2018 /Marc Handelman
Malicious Advertising, Malvertising, Malware, Malware Detection, Information Security, Cybersecurity

Maleware, Airborne →

September 29, 2017 by Marc Handelman in All is Information, Malware, Malware Detection, Information Security

aIRJumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras and Infrared (IR)

September 29, 2017 /Marc Handelman
All is Information, Malware, Malware Detection, Information Security

USENIX Enigma 2017 — Tudor Dumitras' 'FeatureSmith: Learning to Detect Malware by Mining the Security Literature' →

August 31, 2017 by Marc Handelman in Alternate Attack Analysis, All is Information, Conferences, Education, Information Security, Malware, Malware Detection, Data Mining, Data Driven Security, Data Discovery
August 31, 2017 /Marc Handelman
Alternate Attack Analysis, All is Information, Conferences, Education, Information Security, Malware, Malware Detection, Data Mining, Data Driven Security, Data Discovery