❌

Normal view

There are new articles available, click to refresh the page.
Today β€” 26 January 2026IT Security

NDSS 2025 – ERW-Radar

26 January 2026 at 11:00

Authors, Creators & Presenters: Lingbo Zhao (Institute of Information Engineering, Chinese Academy of Sciences), Yuhui Zhang (Institute of Information Engineering, Chinese Academy of Sciences), Zhilu Wang (Institute of Information Engineering, Chinese Academy of Sciences), Fengkai Yuan (Institute of Information Engineering, CAS), Rui Hou (Institute of Information Engineering, Chinese Academy of Sciences)

PAPER
ERW-Radar: An Adaptive Detection System against Evasive Ransomware by Contextual Behavior Detection and Fine-grained Content Analysis

To evade existing antivirus software and detection systems, ransomware authors tend to obscure behavior differences with benign programs by imitating them or by weakening malicious behaviors during encryption. Existing defense solutions have limited effects on defending against evasive ransomware. Fortunately, through extensive observation, we find I/O behaviors of evasive ransomware exhibit a unique repetitiveness during encryption. This is rarely observed in benign programs. Besides, the $chi^2$ test and the probability distribution of byte streams can effectively distinguish encrypted files from benignly modified files. Inspired by these, we first propose ERW-Radar, a detection system, to detect evasive ransomware accurately and efficiently. We make three breakthroughs: 1) a contextual correlation mechanism to detect malicious behaviors; 2) a fine-grained content analysis mechanism to identify encrypted files; and 3) adaptive mechanisms to achieve a better trade-off between accuracy and efficiency. Experiments show that ERW-Radar detects evasive ransomware with an accuracy of 96.18% while maintaining a FPR of 5.36%. The average overhead of ERW-Radar is 5.09% in CPU utilization and 3.80% in memory utilization.

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.


Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – ERW-Radar appeared first on Security Boulevard.

Secure, Reliable Terraform At Scale With Sonatype Nexus Repository

26 January 2026 at 09:00

Terraform has become the de facto standard for infrastructure as code (IaC). From cloud-native startups to global enterprises, teams rely on Terraform to define, provision, and manage infrastructure with speed and consistency across cloud and on-prem environments.

The post Secure, Reliable Terraform At Scale With Sonatype Nexus Repository appeared first on Security Boulevard.

Can Passkeys Be Exploited for Account Access?

Explore if passkeys can be exploited. Learn about potential vulnerabilities in passwordless authentication, fido2 implementation risks, and how to stay secure.

The post Can Passkeys Be Exploited for Account Access? appeared first on Security Boulevard.

What Drives .com Availability and Price When You Register?

22 January 2026 at 09:21

Choosing a .com domain often marks the first step for anyone building an online presence. Many wonder why some .com addresses remain available at a low cost, while others seem expensive or already taken.

The answer involves several factors that influence both the availability and pricing of these sought-after domain names. Understanding these influences can help anyone make informed decisions before registering a .com domain.

Historical Popularity Shapes Supply

A lot of the shorter and more memorable .com domain names were snatched up by early internet users with .com addresses. Many of them are simple or even one-word domains that are long gone.

That early adoption means fewer short, memorable names are available for new users. Some of the oldest and most valuable domains were registered many years ago.

Length And Simplicity Affect Appeal

Shorter domain names are easier to remember and write, making them highly desirable. Such short or one-word domains attract attention and competition. Easy-to-spell, memorable domain names without hyphens or numbers are more valuable.

In contrast, longer, more complicated names may be readily available but often lack the same appeal during a .com domain registration.

Keyword Value Drives Demand

Keywords are more popular among search engines and are closely related to topics that people frequently search.

Those sorts of words are in high demand and still give people hope, with high traffic and instant recognition. Therefore, people want to buy them, especially those types of domain names. These names are often claimed quickly and can command a premium. However, the demand for the keyword determines the rarity and the price of the domain.

Brandability And Market Trends

When we see a trend developing in business or technology, people will want names that signify that change. Enterprises and companies search for creative combinations and terms. In one way, if everyone circulates the same trend, the other areas become scarce, which means we have to pay for the right to use the trend. .com domain registration not only boosts your site’s credibility but also gives you global recognition and a competitive edge in crowded markets.

Being proactive with a domain helps ensure your brand stands out and remains protected as you build your online presence.

Domain Age And Previous Use

A popular, long-established website on a domain registered years ago is generally going to be worth more than (another instance of) a site on a one-month-old issue domain. Existing history can make a domain more appealing, as it might come with free web traffic or search engine trust.

The prices vary greatly, as sellers will sometimes request premium prices for aged domains with other satisfactory reputations or previous content that is relevant to the new owner’s needs.

Marketplaces And Auction Activity

Thousands of domains are sold or purchased at public domain marketplaces or by auction. Some names can even trigger mini-bidding wars between interested parties lined up to gain ownership, quickly pushing final selling prices far beyond regular registration costs.

Some owners have satisfactory domains and are willing to sell for a higher price. Active marketplaces enable sellers to demand higher prices, especially for rare or desirable names.

Registrar Pricing Strategies

Commercial registrars charge different fees for .com domains. Others provide promotional rates to new clients, and the rest have a tendency to focus on add-on providers. Renewal fees vary, and so any upfront savings can come at the cost of long-term affordability. By comparing deals from a range of providers, users can better identify the right deal for their requirements.

Search Engine Optimization Potential

At times, domains with keywords within the title get higher prices. These names are attractive to buyers who are hoping for a boost in traffic and recognition.

The notion that a domain containing one or more keywords will drive higher demand with the help of search rankings and, thus, the price of such names. Regardless, domain consideration is merely one empty, albeit key, constituent of search execution.

Branding vs Exact Match Domains

  • Modern SEO emphasizes brandability and long-term audience trust
  • Unique, memorable brand names now carry more weight than exact keyword matches
  • Exact match domains once helped rankings, but search engines prioritize authentic brands today
  • Brand-focused domains foster audience loyalty and recognition beyond just search results
  • Investing in a brandable domain often offers better long-term value than relying solely on keywords

Balancing Keywords and Brand Identity

Including a relevant keyword in your .com can help people understand what you offer, but your name still needs to be distinct and memorable. Aim for a balance by using simple, relevant terms without stuffing in too many keywords or making the domain awkward. A clear, brandable name that hints at your niche often performs better long-term than a clumsy, exact-match keyword domain.

Global Demand And Regional Trends

Domains with international appeal are increasingly sought-after as businesses aim for global audiences. Regional trends, cultural preferences, and language factors shape both availability and value. As cross-border demand grows, truly universal domain names become rarer and often more expensive.

Secondary Market Influence

A notable number of .com names never reach public registration, as they are sold between individuals or companies. The lack of availability means those names are exposed to secondary market activity, which can inflate prices for anyone with a desire for a precise term. For the domains owned by the registrars, buyers go to the buy broker for negotiation.

Availability and price of .com domains depend on many intertwined factors, from historical registration patterns to current trends and market forces. Understanding what influences these elements can help prospective owners make wise choices.

By considering keyword demand, brandability, registrar pricing, and market activity, anyone can approach the domain search process with greater clarity and confidence. The suitable .com address remains a valuable asset, shaped by both historical choices and current demand.

The post What Drives .com Availability and Price When You Register? appeared first on IT Security Guru.

PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups

25 January 2026 at 19:00
PeckBirdy is a sophisticated JScript-based C&C framework used by China-aligned APT groups to exploit LOLBins across multiple environments, delivering advanced backdoors to target gambling industries and Asian government entities.

Cyber Insights 2026: Threat Hunting in an Age of Automation and AI

26 January 2026 at 07:00

Understanding how threat hunting differs from reactive security provides a deeper understanding of the role, while hinting at how it will evolve in the future.

The post Cyber Insights 2026: Threat Hunting in an Age of Automation and AI appeared first on SecurityWeek.

The New ATO Playbook: Session Hijacking, MFA Bypass, and Credential Abuse Trends for 2026

26 January 2026 at 00:00

Account takeover didn’t disappear β€” it evolved Account takeover (ATO) and credential abuse aren’t new.What’s changed is how attackers do it and why many traditional defenses no longer catch it early. Today’s ATO attacks don’t always start with: Instead, they increasingly rely on: The result: fewer alerts, more successful takeovers. This shift reflects a broader …

The post The New ATO Playbook: Session Hijacking, MFA Bypass, and Credential Abuse Trends for 2026 appeared first on Security Boulevard.

❌
❌