News

Microsoft detects massive surge in Linux XorDDoS malware activity

A stealthy and modular malware used to hack into Linux devices and build a DDoS botnet has seen a massive 254% increase in activity during the last six months, as Microsoft revealed today. https://www.bleepingcomputer.com/news/security/microsoft-detects-massive-surge-in-linux-xorddos-malware-activity/
Read more

NIST – Guide to Computer Security Log Management

A log is a record of the events occurring within an organization’s systems and networks. Logs are composed of log entries; each entry contains information related to a specific event that has occurred within a system or network. Many logs within an organization contain records related to computer security. These computer security logs are generated…
Read more

NIST Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations

Organizations are concerned about the risks associated with products and services that may potentially contain malicious functionality, are counterfeit, or are vulnerable due to poor manufacturing and development practices within the supply chain. These risks are associated with an enterprise’s decreased visibility into and understanding of how the technology they acquire is developed, integrated, and…
Read more

State of Malware Analysis: 2022 Report

As organizations grapple with Advanced Persistent Threats (APTs), targeted attacks, and highlymotivated ransomware groups, malware analysis has become a critical business process to help respond to emerging threats. opswat-2022-state-of-malware-analysis  
Read more