The Architects of Evasion: a Crypters Threat LandscapeLearn about key concepts and different crypters-related activities as well as the lucrative ecosystem of malicious groups that exploit them.#sekoia#EN#2024#Crypters#Evasion#analysis·blog.sekoia.io·Mar 14, 2024The Architects of Evasion: a Crypters Threat Landscape
The Many Faces of Undetected macOS InfoStealers | KeySteal, Atomic & CherryPie Continue to AdaptLearn about the latest threats to macOS as Infostealers continue to rapidly adapt to evade static signatures.#sentinelone#EN#2024#macOS#Infostealers#Evasion#signatures#KeySteal#CherryPie·sentinelone.com·Jan 17, 2024The Many Faces of Undetected macOS InfoStealers | KeySteal, Atomic & CherryPie Continue to Adapt
MacOS info-stealers quickly evolve to evade XProtect detectionMultiple information stealers for the macOS platform have demonstrated the capability to evade detection even when security companies follow and report about new variants frequently.#bleepingcomputer#EN#2024#Information#Malware#Security#Apple#Evasion#Stealer#Info#XProtect#InfoSec#Computer#macOS·bleepingcomputer.com·Jan 17, 2024MacOS info-stealers quickly evolve to evade XProtect detection
Stealth Mode: Chinese Cyber Espionage Actors Continue to Evolve Tactics to Avoid Detection | MandiantWays Chinese cyber espionage activity has increasingly leveraged strategies to evade detection.#mandiant#EN#2023#espionage#Stealth#detection#evasion#UNC3886·mandiant.com·Aug 15, 2023Stealth Mode: Chinese Cyber Espionage Actors Continue to Evolve Tactics to Avoid Detection | Mandiant
AI-Powered 'BlackMamba' Keylogging Attack Evades Modern EDR SecurityResearchers warn that polymorphic malware created with ChatGPT and other LLMs will force a reinvention of security automation.#darkreading#EN#2023#ChatGPT#EDR#evasion#Polymorphic#BlackMamba#LLM·darkreading.com·May 3, 2023AI-Powered 'BlackMamba' Keylogging Attack Evades Modern EDR Security
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade DetectionPartially encrypting victims' files improves ransomware speed and aids evasion. First seen in LockFile, the technique is now being widely adopted.#SentinelOne#EN#2022#LockFile#ransomware#technique#speed#Partially#evasion·sentinelone.com·Sep 9, 2022Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade DetectionPartially encrypting victims' files improves ransomware speed and aids evasion. First seen in LockFile, the technique is now being widely adopted.#SentinelOne#EN#2022#LockFile#ransomware#technique#speed#Partially#evasion·sentinelone.com·Sep 9, 2022Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection