Tag: Security Blog G Data Software AG

Reborn in Rust: AsyncRAT

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Reborn in Rust: AsyncRAT

100 Days of YARA: Writing Signatures for .NET Malware

If YARA signatures for .NET assemblies only rely on strings, they are very limited. We explore more detection opportunities, including IL code, method signature definitions and specific custom attributes. Knowledge about the underlying .NET metadata structures, tokens and streams helps…

100 Days of YARA: Writing Signatures for .NET Malware

If YARA signatures for .NET assemblies only rely on strings, they are very limited. We explore more detection opportunities, including IL code, method signature definitions and specific custom attributes. Knowledge about the underlying .NET metadata structures, tokens and streams helps…

Vidar Stealer: Revealing A New Deception Strategy

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Vidar Stealer: Revealing A New Deception Strategy