Virtual Desktop Tools, Virtual Desktop Strategies

EyeSpy - Iranian Spyware Delivered in VPN Installers

October 12, 2022

eyespy-iranian-spyware
During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Spotlight

Offensive Security

Offensive Security is the leader in performance-based information security training and attack simulations. Additionally, Offensive Security is the creator of industry standard tools such as the Kali Linux penetration testing platform and The Exploit Database, the largest collection of publicly released exploits online.

OTHER WHITEPAPERS
news image

Dell EMC Unity XT: Introduction to the Platform

whitePaper | January 5, 2020

This white paper provides an overview of the Dell EMC Unity™ XT platform hardware and includes information about virtual deployments of Dell EMC Unity storage. Models covered include Dell EMC Unity 380/F, 480/F, 680/F, and 880F systems. This document also describes purpose-built Dell EMC Unity XT systems and compares the similarities and differences between All-Flash and Hybrid variants.

Read More
news image

Virtualization is the Present and Future of Mobile Networks

whitePaper | June 15, 2022

The future of mobile networks will be software-centric, and Samsung is leading the way to transforming how wireless networks are designed and implemented using virtualization. The hardware-centric approach for network development, using vendor-specific hardware designs, has remained static for decades. That model is unable to keep up with the fast-changing world of today’s telecommunication services.

Read More
news image

Securing Remote Work Safeguarding Business Continuity with Zscaler

whitePaper | December 22, 2021

These are unpredictable and unsettling times. Like all of you, I am watching events unfold in the global response to COVID-19, and I am doing what is best for my family, the Zscaler family, and Zscaler customers and partners. Zscaler’s mission is to provide secure, fast, and reliable access to applications, no matter where they are hosted, and no matter where users connect. Zscaler is playing a pivotal role for enterprises as they respond to the crisis: We have an obligation to help customers keep employees safe and productive as they work remotely.

Read More
news image

Software-Defined Data Center – infrastructure for enterprise digital transformation

whitePaper | November 14, 2022

Over the years the trend toward virtualization revolutionized data centers, but it did not change the hardwarecentric architecture that still serves as the basis for most data centers today. This could radically change in light of the latest software-defined approaches. Strategy, organization, technology: This white paper serves as a source of orientation for IT managers confronted with software-defined data center concepts.

Read More
news image

VMware vRealize Suite and vCloud Suite 2019

whitePaper | January 15, 2020

VMware vRealize® Suite is an enterprise-ready, cloud management platform that the industry’s most complete solution for managing a heterogeneous, hybrid cloud. It proactively addresses health, performance and capacity management of IT services across heterogeneous and hybrid cloud environments to improve efficiency, performance and availability. In addition, IT organizations can address cloud management requirements across Day 1 and Day 2 operations for compute-, storage-, network- and application-level resources across private and public clouds.

Read More
news image

IPU Based Cloud Infrastructure

whitePaper | January 1, 2023

2020 will go down in history as the year the world met with one of its most significant challenges in nearly a century – the great coronavirus pandemic. The resulting situation can be aptly described by the term “VUCA,” an acronym standing for Volatility, Uncertainty, Complexity and Ambiguity. In other words, the world faced a crisis.

Read More

Spotlight

Offensive Security

Offensive Security is the leader in performance-based information security training and attack simulations. Additionally, Offensive Security is the creator of industry standard tools such as the Kali Linux penetration testing platform and The Exploit Database, the largest collection of publicly released exploits online.

Events