<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic GHOSTPULSE Hides Within PNG File Pixel Structure To Evade Detections in Threats</title>
    <link>https://community.isc2.org/t5/Threats/GHOSTPULSE-Hides-Within-PNG-File-Pixel-Structure-To-Evade/m-p/74760#M1411</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The popularity of PNG files combined with their widespread use on the internet makes them an attractive vector for threat actors. They also target PNG files primarily because they can hide malicious code using techniques like “&lt;A href="https://cybersecuritynews.com/hackers-steganography-png-malware/" target="_blank" rel="noreferrer noopener"&gt;steganography&lt;/A&gt;.”&lt;/P&gt;&lt;P&gt;Elastic security labs researchers recently discovered that GHOSTPULSE malware hides within PNG file pixel structure to evade detections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cybersecuritynews.com/ghostpulse-hides-within-png/" target="_blank"&gt;https://cybersecuritynews.com/ghostpulse-hides-within-png/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Tue, 29 Oct 2024 01:55:18 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-10-29T01:55:18Z</dc:date>
    <item>
      <title>GHOSTPULSE Hides Within PNG File Pixel Structure To Evade Detections</title>
      <link>https://community.isc2.org/t5/Threats/GHOSTPULSE-Hides-Within-PNG-File-Pixel-Structure-To-Evade/m-p/74760#M1411</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The popularity of PNG files combined with their widespread use on the internet makes them an attractive vector for threat actors. They also target PNG files primarily because they can hide malicious code using techniques like “&lt;A href="https://cybersecuritynews.com/hackers-steganography-png-malware/" target="_blank" rel="noreferrer noopener"&gt;steganography&lt;/A&gt;.”&lt;/P&gt;&lt;P&gt;Elastic security labs researchers recently discovered that GHOSTPULSE malware hides within PNG file pixel structure to evade detections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cybersecuritynews.com/ghostpulse-hides-within-png/" target="_blank"&gt;https://cybersecuritynews.com/ghostpulse-hides-within-png/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 01:55:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/GHOSTPULSE-Hides-Within-PNG-File-Pixel-Structure-To-Evade/m-p/74760#M1411</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-10-29T01:55:18Z</dc:date>
    </item>
  </channel>
</rss>

