Submit your search
2022-06-07
Block malicious domains by using Alvosec lists for uBlock

The uBlock Origin is a free and open-source, cross-platform browser extension for content filtering - primarily aimed at neutralizing privacy invasion in an efficient, user-friendly method. There are many free lists - used to block advertisements, trackers, malware, and annoyances. We've made three lists, that can be imported in uBlock Origin extension, to increase security […]

Read More
2022-06-05
Browser In The Browser (BITB) Attack

A novel phishing technique called browser-in-the-browser (BitB) attack can be exploited to simulate a browser window within the browser in order to spoof a legitimate domain, thereby making it possible to stage convincing phishing attacks. According to penetration tester and security researcher, who goes by the handle mrd0x on Twitter, the method takes advantage of […]

Read More
2022-06-05
CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability "Follina"

Description A vulnerability has been discovered in Microsoft Support Diagnostic Tool (MSDT) which could allow for arbitrary code execution. MSDT can be called using the URL protocol from a calling application like Word allowing an attacker to run arbitrary code with the privileges of the user that executed the program. An attacker can entice a […]

Read More
2022-05-29
Exposed! How scammers steal crypto private keys?

We must say that by the time of our researching crypto scams, we have witnessed that methods of these scammers are getting more and more sophisticated, and that's why we advise all users to be extra cautious when they engage with something unusual/unverified.

Read More
2022-05-27
Discovering the chain of fake crypto exchanges

2022 is the year for cryptocurrency and blockchain as more and more people are interesting to involve to different aspects of this new technology. While most of us are still exploring how it works, scammers have already found a million ways to make a profit — by creating fake cryptocurrency trading websites and fake crypto […]

Read More
2022-05-23
How to use YARA rules to identify malware

YARA is an open-source tool designed to help malware researchers identify and classify malware samples. It makes it possible to create descriptions (or rules) for malware families based on textual and/or binary patterns. YARA is multi-platform, running on Linux, Windows and Mac OS X. It can be used through its command-line interface or from Python scripts with […]

Read More
1 11 12 13 14 15 18

Ready for Action?

Don’t hesitate to contact us if you need more information.
Let's Go!
ALVOSEC
BTC: bc1qnn4zfqqtexl4fkjk2vz6tk74sn92x326wwn0ph

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram