+1.813.321.0987

Linux security has taken its place among the most pressing security concerns in the industry, as explained in an article by UPI. Emotet evolves and Office documents continue to be infection vectors.

For more articles, check out our #onpatrol4malware blog.

malicious Microsoft Office documents

New malware targets security to mine cryptocurrency undetected

Source: UPI

Researchers have uncovered a new type of malware that can remove security features on Linux cloud servers without detection. Read more.

malicious Microsoft Office documents

Hosting malicious sites on legitimate servers: How do threat actors get away with it?

Source: Malwarebytes

Imposters can give your company an undeserved bad reputation and cause financial damages. Many financial companies are held responsible for losses due to phishing mails and fake copies of their websites. Read more.

malicious Microsoft Office documents

Websites can steal browser data via extensions APIs

Source: ZDNet

Researcher finds nearly 200 Chrome, Firefox, and Opera extensions vulnerable to attacks from malicious sites. Read more.

IOT

DarkHydrus delivers new Trojan that can use Google Drive for C2 communications

Source: Palo Alto Networks

We collected a total of three DarkHydrus delivery documents installing a new variant of the RogueRobin trojan. Read more.

malicious Microsoft Office documents

Emotet re-emerges after the holidays

Source: Talos

These new malicious efforts involve sending victims malicious Microsoft Word attachments with embedded macros that download Emotet. Read more.