Tag

malware

0 views collected around this technical thread.

DevOps Operations Practice
DevOps Operations Practice
Feb 23, 2025 · Information Security

Understanding Network Attacks: Definitions, Common Types, and Prevention Strategies

This article explains what network attacks are, outlines the most common attack types such as malware, DoS/DDoS, phishing, SQL injection and DNS tunneling, and provides practical prevention measures including regular updates, firewall configuration, VPN use, and security awareness training.

DDoSPreventionSQL injection
0 likes · 6 min read
Understanding Network Attacks: Definitions, Common Types, and Prevention Strategies
Raymond Ops
Raymond Ops
Dec 29, 2024 · Information Security

What Every Hacker Calls It: A Comprehensive Glossary of Cyber Threats

This article provides a detailed glossary of common hacking terms and techniques—from black‑hat attackers and backdoors to APTs, exploits, and dark‑web concepts—explaining each threat, its purpose, and how it impacts information security.

APTSecurityexploit
0 likes · 17 min read
What Every Hacker Calls It: A Comprehensive Glossary of Cyber Threats
Code Mala Tang
Code Mala Tang
Dec 19, 2024 · Information Security

How a Supply‑Chain Attack Compromised Vant and Rspack – Frontend Security Lessons

A recent supply‑chain poisoning incident injected malicious post‑install scripts into the popular Vant component library and Rspack build tool, stealing cloud credentials and mining Monero, prompting developers to upgrade to safe versions and reconsider npm dependency risks.

RspackSupply chain attackVant
0 likes · 5 min read
How a Supply‑Chain Attack Compromised Vant and Rspack – Frontend Security Lessons
DevOps Operations Practice
DevOps Operations Practice
Dec 8, 2024 · Information Security

Incident Report: Investigating and Removing a Server Malware Causing 100% CPU Usage

This article documents a step‑by‑step investigation of a compromised Linux server that exhibited 100% CPU usage, detailing process, network, and startup‑service analysis, the discovery of a cryptomining malware, and the complete removal procedure.

CPUIncident ResponseLinux
0 likes · 5 min read
Incident Report: Investigating and Removing a Server Malware Causing 100% CPU Usage
Efficient Ops
Efficient Ops
Nov 25, 2024 · Information Security

Uncovering the gpg-agentd Malware: How an Alibaba Cloud Server Was Compromised

This article walks through a real-world intrusion on an Alibaba Cloud CentOS server, detailing how a disguised gpg-agentd process was used to install backdoors, hijack SSH keys, exploit Redis, and launch mass scanning, and provides concrete hardening recommendations to prevent similar attacks.

Server Securitylinux incident responsemalware
0 likes · 13 min read
Uncovering the gpg-agentd Malware: How an Alibaba Cloud Server Was Compromised
IT Services Circle
IT Services Circle
Jun 4, 2024 · Information Security

Malware Campaign Using Fake MS Office Crack Tool Spreads RAT, XMRig Miner, and 3Proxy Proxy

A recent ASEC report reveals that a malicious program disguised as the popular Office 2013‑2024 C2R Install crack tool distributes a .NET‑based malware suite that installs Orcus RAT, the XMRig cryptocurrency miner, and the 3Proxy proxy tool, primarily targeting Korean users and persisting via scheduled tasks and PowerShell updates.

3ProxyKorean usersOffice crack
0 likes · 5 min read
Malware Campaign Using Fake MS Office Crack Tool Spreads RAT, XMRig Miner, and 3Proxy Proxy
IT Services Circle
IT Services Circle
Dec 4, 2023 · Information Security

Supply‑Chain Vulnerabilities in the JavaScript/npm Ecosystem: Notable Cases and Lessons

This article surveys a series of high‑profile supply‑chain attacks on the JavaScript/npm ecosystem—such as left‑pad removal, malicious faker.js updates, cross‑env hijacking, is‑promise bugs, getcookies backdoors, event‑stream social‑engineering, ESLint credential leaks, manifest obfuscation, and politically‑motivated code injections—highlighting how tiny, widely‑used packages can become vectors for large‑scale compromise and what developers can do to mitigate the risk.

JavaScriptPackage ManagementSecurity
0 likes · 17 min read
Supply‑Chain Vulnerabilities in the JavaScript/npm Ecosystem: Notable Cases and Lessons
IT Services Circle
IT Services Circle
Feb 24, 2023 · Information Security

The Dark Side of ChatGPT: Scams, Prompt Injection, and Security Risks

The article examines how the rapid popularity of ChatGPT has spurred both legitimate opportunities and a surge in illicit activities, including account resale, scam scripts generated via prompt injection, and the creation of malware, highlighting the need for stricter regulation and security awareness.

AI misuseAI securityChatGPT
0 likes · 6 min read
The Dark Side of ChatGPT: Scams, Prompt Injection, and Security Risks
php中文网 Courses
php中文网 Courses
Oct 18, 2022 · Information Security

In-Memory PHP Trojan: Source Code, Explanation, and Mitigation

This article explains the concept of in‑memory PHP trojans, provides simple obfuscated source code that deletes itself and persists in RAM, discusses their stealth characteristics, and offers a basic mitigation strategy of terminating the process and removing the generated files.

Memory TrojanPHPcode obfuscation
0 likes · 3 min read
In-Memory PHP Trojan: Source Code, Explanation, and Mitigation
Laravel Tech Community
Laravel Tech Community
Sep 20, 2022 · Information Security

NSA TAO Cyber Attack on Northwestern Polytechnical University: Investigation and Technical Analysis

An in‑depth investigation by China’s national computer emergency response center and 360 Company uncovered a sophisticated cyber‑attack on Northwestern Polytechnical University orchestrated by the U.S. NSA’s Tailored Access Operations unit, detailing the attack infrastructure, weaponised tools, data theft and broader implications for Chinese critical sectors.

CyberattackNSANorthwestern Polytechnical University
0 likes · 9 min read
NSA TAO Cyber Attack on Northwestern Polytechnical University: Investigation and Technical Analysis
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Phishing Techniques: Theory, Classification, and Defense Strategies

The article provides a comprehensive overview of phishing as a social‑engineering attack, detailing its various techniques—including email deception, spear‑phishing, whaling, malware‑based lures, domain spoofing, vishing, SMS and QR‑code scams—and offers practical defense measures such as anti‑phishing tools, multi‑factor authentication, content filtering, and security standards.

Defense Strategiesemail securitymalware
0 likes · 14 min read
Phishing Techniques: Theory, Classification, and Defense Strategies
Laravel Tech Community
Laravel Tech Community
Jul 14, 2022 · Information Security

Understanding WeChat Chat Security, Encryption Mechanisms, and Potential Monitoring Risks

The article explains how WeChat aims to protect chat content through asymmetric key exchange and symmetric encryption, discusses why network monitoring alone cannot capture messages, and warns about other threats such as monitoring software, system vulnerabilities, and private‑key compromise that can expose communications.

WeChatchat securityencryption
0 likes · 9 min read
Understanding WeChat Chat Security, Encryption Mechanisms, and Potential Monitoring Risks
Python Programming Learning Circle
Python Programming Learning Circle
May 30, 2022 · Information Security

Mozilla Blocks Malicious Firefox Add-ons “Bypass” and “Bypass XM” and Details Security Risks and Updates

Mozilla’s security team has blocked the malicious Firefox add-ons “Bypass” and “Bypass XM”, which abused the browser’s proxy API to hijack updates and bypass paywalls, affecting hundreds of thousands of users, and introduced new fallback mechanisms and a “Proxy Failover” extension in Firefox 93.

Add-onsBrowser UpdatesFirefox
0 likes · 5 min read
Mozilla Blocks Malicious Firefox Add-ons “Bypass” and “Bypass XM” and Details Security Risks and Updates
Java Captain
Java Captain
Apr 30, 2022 · Information Security

Understanding Chat Application Security: Encryption, Network Monitoring, and Potential Vulnerabilities

The article explains how modern chat applications protect communication with asymmetric and symmetric encryption, why network eavesdropping alone cannot reveal messages, and how installed monitoring software or system vulnerabilities can still expose chat records, emphasizing the need for regular updates and careful device usage.

chat securityencryptioninformation security
0 likes · 9 min read
Understanding Chat Application Security: Encryption, Network Monitoring, and Potential Vulnerabilities
IT Services Circle
IT Services Circle
Apr 24, 2022 · Information Security

Inno Stealer Malware Disguised as Windows 11 Installer Targets Users

A new Inno Stealer malware campaign masquerades as a legitimate Windows 11 upgrade installer, using a spoofed Microsoft site to distribute an infected ISO that creates hidden scripts, disables security, and steals browser data and cryptocurrency wallets, posing a serious information‑security threat.

Inno StealerWindows 11information security
0 likes · 4 min read
Inno Stealer Malware Disguised as Windows 11 Installer Targets Users
IT Services Circle
IT Services Circle
Apr 9, 2022 · Information Security

How to Identify and Avoid Fake Chrome Browser Downloads

The article explains how counterfeit Chrome browsers proliferate in China, how search engine ads and misleading download pages trick users into installing malicious software, and provides a reliable method to obtain the genuine offline Chrome installer to protect against these security threats.

ChromeDownload SafetyFake Browser
0 likes · 6 min read
How to Identify and Avoid Fake Chrome Browser Downloads
Java Architect Essentials
Java Architect Essentials
Jun 12, 2021 · Information Security

China's First Nationwide Case of Illegal WeChat Data Harvesting via "Clean Fan" Software

In September 2022, Nantong police uncovered China's first nationwide case of illegal WeChat user data harvesting using a "clean fan" application, leading to the arrest of eight suspects who were convicted for illegally obtaining computer system data and controlling systems, highlighting severe information security risks.

ChinaWeChatcybercrime
0 likes · 7 min read
China's First Nationwide Case of Illegal WeChat Data Harvesting via "Clean Fan" Software
Java Architect Essentials
Java Architect Essentials
Apr 5, 2021 · Information Security

Malicious Qike PDF Converter Spreads via Silent Downloaders, Causes High CPU Usage

Huorong’s threat intelligence team discovered that the Qike PDF Converter distributes a hidden malicious proxy module through download‑site installers, leading to unexplained high CPU usage, persistent system services, and widespread infection traced back to a Hangzhou tech company, urging users to update antivirus definitions and remove the software.

Huoronginformation securitymalware
0 likes · 5 min read
Malicious Qike PDF Converter Spreads via Silent Downloaders, Causes High CPU Usage
Tencent Cloud Developer
Tencent Cloud Developer
Jul 27, 2020 · Information Security

Tencent Game Security 2019 Annual Report: Cheating, Black Markets, and Account Security Trends

The 2019 Tencent Game Security report reveals rising cheat samples on PC and mobile, dominant custom cheats, emerging subtle cheating tactics, a diversified black‑market selling fake IDs and compromised devices, rampant account theft largely through scams, and improved player reporting that boosted detection rates.

Tencentaccount theftanti-cheat
0 likes · 9 min read
Tencent Game Security 2019 Annual Report: Cheating, Black Markets, and Account Security Trends