SophosLabs

(get it in RSS or Atom)

Monday review - the hot 21 stories of the week

Did you miss anything in the past week?

Here's a recap of the hot 21 stories of the past seven days, so you can catch up quickly!

ZeroAccess malware revisited - new version yet more devious

za-weird-250

Guess what? The authors of the infamous ZeroAccess malware have pushed out another update, and this time they're using some interesting techniques to stay alive longer.

James Wyke of SophosLabs explains...

Monday review - the hot 20 stories of the week

Monday review

In case you missed any recent stories, here's everything we wrote in the last seven days.

Who is SophosLabs: James Wyke, Senior Threat Researcher

Who is SophosLabs

In the third post in our ‘Who is SophosLabs’ series, threat researcher James Wyke discusses the challenge of securing a mobile distributed workforce and his tips on how to stay safe online. We think he's joking about living in a bunker...

Monday review - the hot 18 stories of the week

Monday review

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

A look at Point of Sale RAM scraper malware and how it works

Malware that attacks point-of-sale systems - how it works

A special kind of malware has been hitting the headlines recently - that which attacks the RAM of Point of Sale (PoS) systems.. In this article, Numaan Huq from SophosLabs takes a step back from the technical details and looks at the evolution of these PoS RAM scrapers.

Monday review - the hot 15 stories of the week

Monday review

Missed anything last week? Catch up with everything we talked about with this handy weekly roundup.

Who is SophosLabs: Joanne Garvey, Threat Researcher

Who is SophosLabs

In the second post in our ‘Who is SophosLabs’ series, threat researcher Joanne Garvey reveals how she protects her information online, why she has no time for hobbies, and her fascination with chaos theory.

Monday review - the hot 16 stories of the week

Monday review

Catch up with everything we've written in the last seven days - it's weekly roundup time.

The four seasons of Glazunov: digging further into Sibhost and Flimkit

The four seasons of Glazunov: digging further into Sibhost and Flimkit

Following on from the recent analysis of the Glazunov exploit kit, Fraser Howard takes a detailed look at two other closely related kits. He finds several similarities which suggest that the same criminal group may well be behind all three.

Taking a closer look at the Glazunov exploit kit

Taking a closer look at the Glazunov exploit kit

In this article, Fraser Howard takes a look at Glazunov - an exploit kit that has been increasingly active in recent weeks. In this deep dive, readers can learn more about how these attacks operate.

Who is SophosLabs: Numaan Huq, Threat Researcher

Who is SophosLabs

SophosLabs is at the centre of Sophos. It's where highly skilled analysts work round the clock to build protection from the latest threats. But what kind of people work there?

Monday review - the hot 16 stories of the week

Monday review

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

Was Microsoft's takedown of Citadel effective?

Was Microsoft's takedown of Citadel effective?

Last week, Microsoft took aim at more than 1,400 Citadel botnets by sinkholing their command and control infrastructure.

What was the actual effect of this takedown? SophosLabs takes a look...

Guntior bootkit up to new tricks

Check your help

A technical analysis of the Guntior bootkit and its DLL load order abuse of the Windows Help Center.

Monday review - the hot 21 stories of the week

Monday review

Catch up with everything we've written in the last seven days - it's weekly roundup time.

A closer look at the malicious Redkit exploit kit

A closer look at the malicious Redkit exploit kit

In the second technical article of this series, Fraser Howard investigates deeper into the workings of Redkit exploit kit.

Learn more about the internals of this kit; bypassing of security mechanisms within Java, the use of file encryption, and delivery of multiple payloads.

Monday review - the hot 20 stories of the week

Monday review

Get up to date with everything we wrote in the past seven days - it's weekly roundup time.

Lifting the lid on the Redkit exploit kit

In the first of a two part series, Fraser Howard takes a closer look at the Redkit exploit kit.

Learn more about how this kit works and the compromised web servers that are being used to host it.

Monday review - the hot 21 stories of the week

Monday review

In case you missed anything, here's everything we wrote in the past seven days.