Mindblown: a blog about philosophy.

  • ‘North Korea’ a hot subject among VB2018 talks

    A few years ago, I somehow got involved in the discussion of a run-of-the-mill malicious spam campaign and ended up speaking to a journalist from the Daily Telegraph . “Is it true that North Korea may be behind this campaign?”, the journalist asked me – I had a hard time trying to keep a straight…

  • Expired domain led to SpamCannibal’s blacklist eating the whole world

    The first line of defence in many a spam filter is to query one or more DNS blacklists to see if the sender’s IP address (and sometimes their domain) is listed as a known spammer. As the name suggests, a DNS blacklist is queried over DNS: to do a lookup for the IP address 1.2.3.4…

  • Expired domain led to SpamCannibal’s blacklist eating the whole world

    The first line of defence in many a spam filter is to query one or more DNS blacklists to see if the sender’s IP address (and sometimes their domain) is listed as a known spammer. As the name suggests, a DNS blacklist is queried over DNS: to do a lookup for the IP address 1.2.3.4…

  • MnuBot banking trojan communicates via SQL server

    Researchers at IBM X-Force have discovered a new banking trojan, dubbed ‘MnuBot’, which is targeting Internet users in Brazil. The trojan performs tasks common to banking malware, such as logging keystrokes, creating screenshots and overlaying the bank’s website with an invisible form. What is most noticeable, though, is the use of a Microsoft SQL server…

  • MnuBot banking trojan communicates via SQL server

    Researchers at IBM X-Force have discovered a new banking trojan, dubbed ‘MnuBot’, which is targeting Internet users in Brazil. The trojan performs tasks common to banking malware, such as logging keystrokes, creating screenshots and overlaying the bank’s website with an invisible form. What is most noticeable, though, is the use of a Microsoft SQL server…

  • Throwback Thursday: Giving the EICAR test file some teeth

    When in our VB100 test lab we set up an anti-virus product, one of the first things we do is to see if it works by making it scan the EICAR test file. This 68-byte file is supposed to be detected by any anti-virus product but does not perform any malicious activities and thus can…

  • Throwback Thursday: Giving the EICAR test file some teeth

    When in our VB100 test lab we set up an anti-virus product, one of the first things we do is to see if it works by making it scan the EICAR test file. This 68-byte file is supposed to be detected by any anti-virus product but does not perform any malicious activities and thus can…

  • XMRig used in new macOS cryptominer

    Users complaining on Apple ‘s official discussion forum about processes that use a lot of CPU have led to the discovery of a new piece of cryptocurrency-mining malware on macOS that is based on XMRig, Malwarebytes researcher Thomas Reed writes . The open-source XMRig Monero miner is widely used for both benign and malicious purposes.…

  • XMRig used in new macOS cryptominer

    Users complaining on Apple ‘s official discussion forum about processes that use a lot of CPU have led to the discovery of a new piece of cryptocurrency-mining malware on macOS that is based on XMRig, Malwarebytes researcher Thomas Reed writes . The open-source XMRig Monero miner is widely used for both benign and malicious purposes.…

  • Tendency for DDoS attacks to become less volumetric fits in a wider trend

    A current trend sees DDoS attacks focusing less on large volume attacks and more on attacks that exhaust server resources, Cloudflare reports . The number of layer 7 attacks per day. Source: Cloudflare. This makes sense. The purpose of a DDoS attack is to render a service unavailable, and as increased defences have made it…

Got any book recommendations?