Topic: powershell scripts
-
Russian Hackers Hide Malware in Linux VMs Using Hyper-V
The Russian cyber-espionage group Curly COMrades uses Microsoft's Hyper-V to hide malware in concealed Linux virtual machines, evading standard security measures and targeting entities aligned with Russian interests. Attackers deploy a minimal Alpine Linux VM hosting custom tools like CurlyShell ...
Read More » -
Akira Ransomware Hijacks Victim's Remote Management Tool
Hackers used the trusted Datto RMM tool and a Living Off The Land strategy to deploy Akira ransomware, disguising their actions as normal IT operations to avoid detection. The attack was halted by Barracuda Managed XDR, which detected the encryption activity and immediately isolated the compromis...
Read More » -
Inside the Qilin Ransomware Investigation
Security analysts must creatively piece together limited digital evidence from various sources to reconstruct cyberattacks, as investigations are often complicated by incomplete visibility and delayed tool deployment. In a Qilin ransomware case, investigators used antivirus alerts and Windows log...
Read More » -
EntraGoat: Simulate Identity Security Risks in Microsoft Entra ID
EntraGoat is an open-source tool that simulates real-world vulnerabilities in Microsoft Entra ID environments, enabling hands-on learning without affecting live systems. The platform offers self-contained test environments with privilege escalation scenarios, guided walkthroughs, and interactive ...
Read More » -
GitHub Abused in Malware-as-a-Service Attack Campaign
Security researchers found a malware campaign using GitHub repositories to distribute threats like SmokeLoader and AsyncRAT via a malware-as-a-service model, linked to the Amadey botnet and Emmenhtal loaders. Attackers shifted from phishing emails to hosting malicious scripts on GitHub, exploitin...
Read More » -
Experts: Uninstall These 12 Windows Apps Now
Bloatware on new Windows computers slows system performance by consuming resources and raises privacy concerns through data collection. Many pre-installed applications, like promotional games and redundant tools, are safe to remove to reclaim storage and streamline the system. Specific apps such ...
Read More »