Topic: scheduled tasks

  • Stop Malware Persistence: A Wazuh Defense Guide

    Stop Malware Persistence: A Wazuh Defense Guide

    Malware persistence allows attackers to maintain long-term access to compromised systems by using techniques like scheduled tasks, boot scripts, and system process modifications. Successful persistence leads to severe consequences, including extended undetected operations, data exfiltration, and ...

    Read More »
  • New 'Obscura' Ransomware Emerges as Stealthy Threat

    New 'Obscura' Ransomware Emerges as Stealthy Threat

    A new ransomware called "Obscura," discovered in late August 2025, uses domain infrastructure to stealthily spread across corporate networks by placing itself in the NETLOGON share for automatic replication. Upon execution, it disables recovery mechanisms like Volume Shadow Copies, terminates ove...

    Read More »