If YARA signatures for .NET assemblies only rely on strings, they are very limited. We explore more detection opportunities, including IL code, method signature definitions and specific custom attributes. Knowledge about the underlying .NET metadata structures, tokens...
Nothing in life is truly free—and that includes the apps and games your child loves. While they may not require an upfront payment, many of these "free" apps come with hidden costs. Some collect personal data, others bombard kids with ads, and many encourage spending...
Internet users in Romania are finding their social media posts and online news articles bombarded with comments promoting blatant propaganda, inciting hatred towards the EU and NATO, and support for Vladimir Putin's Russia. That's the finding of an investigation which...
CERT-UA, the Ukrainian cybersecurity watchdog, has issued a warning about a highly sophisticated espionage campaign aimed at military innovation centers, law enforcement bodies, and local government offices across Ukraine. The suspected threat actor, tracked as...
A Florida man, linked to the notorious Scattered Spider hacking gang, has pleaded guilty to charges related to cryptocurrency thefts which have netted hundreds of thousands of dollars. 20-year-old Noah Michael Urban of Palm Coast, Florida, who was arrested in January...
Happy World Health Day! While we’re all focusing on fitness, nutrition, and wellness, scammers are doing their own kind of stretches—stretching the truth, that is. Scammers love wellness trends because they make for great bait. From bogus supplements to fake fitness...