Two different payloads are hiding in audio files, each paired with one of three loaders. Audio .WAV files are the latest hiding place for obfuscated malicious code; a campaign has been spotted in ...
Threat analysts have discovered a new obfuscation technique used by the Hive ransomware gang, which involves IPv4 addresses and a series of conversions that eventually lead to downloading a Cobalt ...
Since last fall, well-known backdoor malware SmokeLoader has been upgraded with a new second-stage payload dropper called CoffeeLoader that's tricked out with techniques to beat endpoint security ...
Attackers are increasingly changing up the techniques used to obfuscate what their software is doing, with one group hiding parts of their code using a variety of techniques swapped out every 37 days ...