all InfoSec news
Qakbot malware evolves to bypass detection
July 13, 2022, 4:36 p.m. | SC Staff
SC Magazine feed for Strategy www.scmagazine.com
The Hacker News reports that HYPERLINK "https://www.scmagazine.com/brief/email-security/novel-windows-installer-vector-leveraged-by-qbot-malware" Qakbot malware operators have been discovered by Zscaler researchers to have adopted code obfuscation and new attack chain layers, as well as leveraged various URLs and file extensions for payload delivery in an effort to better conceal their operations. "Most recently, threat actors have transformed their techniques to evade detection by using ZIP file extensions, enticing file names with common formats, and Excel (XLM) 4.0 to trick victims into downloading malicious attachments that …
More from www.scmagazine.com / SC Magazine feed for Strategy
Jobs in InfoSec / Cybersecurity
Red Team Penetration Tester and Operator, Junior
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)
Director, Security Operations & Risk Management
@ Live Nation Entertainment | Toronto, ON
IT and Security Specialist APAC (F/M/D)
@ Flowdesk | Singapore, Singapore, Singapore
Senior Security Controls Assessor
@ Capgemini | Washington, DC, District of Columbia, United States; McLean, Virginia, United States
GRC Systems Solution Architect
@ Deloitte | Midrand, South Africa
Cybersecurity Subject Matter Expert (SME)
@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States