Articles on Malware
- Malware Specialized Honeypots for SSH, Web and Malware Attacks Specialized honeypots match a single attacker tactic, turning ambiguous activity into precise telemetry whether they wait for attackers to arrive or actively visit suspicious sites. The T-Pot...
- Malware What Is Cloud Anti-Virus and How Does It Work? Cloud anti-virus uses lightweight endpoint agents that offload analysis to provider infrastructure—less system strain, smaller attack surface. Agents submit file metadata (hashes, behavior, origin)...
- Malware What is Malware? A program counts as malware not because of what it can do, but because of how an attacker uses it. This view aligns with NIST's longer formulation but cuts the verbiage.
- Social Engineering Asymmetry of Data Value, Social Engineering, and What To Do Information perceived as valueless won't be protected—but its value to attackers differs from value to the organization. Knowing AV product names helps tune malware; knowing application versions...
- Malware Detailed PDF Malware Threat Report from Symantec
- Malware Malware That Modifies the Routing Table on Infected Hosts Beyond modifying hosts files to block access to security domains, malware can modify the routing table on infected hosts after receiving null-routing instructions through HTTP-based C&C channels....