Topic: scheduled tasks
-
Stop Malware Persistence: A Wazuh Defense Guide
Malware persistence allows attackers to maintain long-term access to compromised systems by using techniques like scheduled tasks, boot scripts, and system process modifications. Successful persistence leads to severe consequences, including extended undetected operations, data exfiltration, and ...
Read More » -
New 'Obscura' Ransomware Emerges as Stealthy Threat
A new ransomware called "Obscura," discovered in late August 2025, uses domain infrastructure to stealthily spread across corporate networks by placing itself in the NETLOGON share for automatic replication. Upon execution, it disables recovery mechanisms like Volume Shadow Copies, terminates ove...
Read More »