+1.813.321.0987

Read some of the most interesting and useful infosec articles we came across during the first half of October 2018. We have included an article on what to do after a breach because the majority of us will, unfortunately, need this information at some point. Also, learn about malicious code can that be used to create a cryptominer, about the GPlayed trojan that poses as Google Play and more.

For more articles, check out our #onpatrol4malware blog.

Share this post:

emotet trojan

Let’s Pretend You’ve Been Breached. Now What?

Source: ITSP Magazine

With attacks occurring every 39 seconds, everyone gets breached sooner or later. Even organizations that have seemingly robust cyber security solutions in place aren’t immune. Learn about steps you can put in place to mitigate the damage. Read more.

emotet trojan

Adaptable, All-in-One Android Trojan Shows the Future of Malware

Source: Threatpost

GPlayed may be the new face of malware — flexible and adaptable, with a Swiss Army knife-like toolbox that can be used to target pretty much anyone. Read more.

emotet trojan

Recent wave of hijacked WhatsApp accounts traced back to voicemail hacking

Source: ZDNet

A wave of reports about hijacked WhatsApp accounts in Israel has forced the government’s cyber-security agency to send out a nation-wide security alert recently. Read more.

emotet trojan

GPlayed Trojan – .Net playing with Google Market

Source IBM Security Intelligence

Cisco Talos has identified the latest attempt to penetrate mobile devices — a new Android trojan that we have dubbed “GPlayed.” This is an extremely flexible trojan, making it a very effective tool for malicious actors. Read more.

emotet trojan

The VORACLE OpenVPN Attack: What You Need to Know

Source: McAfee

VORACLE, a recently discovered vulnerability that was announced at a security conference by security researcher Ahamad Nafeez, is making some people reconsider using a VPN.  Read more.

emotet trojan

Obfuscated JavaScript Cryptominer

Source: Sucuri Blog

Dig into an encrypted malicious code to discover how an a piece of heavily obfuscated JavaScript malware can create a cryptominer. Read more.