Tag: Analysis
-
New ‘Mac-A-Mal’ Tool Automates Mac Malware Hunting & Analysis
Malware targeting Windows machines still dominates the threat landscape, but hackers gradually have been expanding their target range to …
-
Kaspersky uncovers sophisticated cyber-espionage operation across Africa and Middle East
Researchers have uncovered new malware that has apparently been used to spy on victims in the Middle East and Africa for six years …
-
Analysis suggests North Korea not behind Olympic Destroyer malware attack
A close analysis of the code that took down part of the 2018 Winter Olympics infrastructure appears to show a cunning plan to make it look …
-
Off-The-Shelf Hacker: Parts and Creativity
I’m up to page 174 in “Creativity: The Psychology of Discovery and Invention,” by Mihaly …
-
4 Threat Models for Kubernetes Deployment Security
As an orchestration platform, Kubernetes impacts many runtime security functions. These include authentication, authorization, logging and …
●●●