Malware

Using Microsoft Powerpoint as Malware Dropper

Marco Ramilli, founder and CEO at cyber security firm Yoroi has explained how to use Microsoft Powerpoint as Malware Dropper…

7 years ago

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

According to Group-IB’s report findings, Asia is one of the most actively attacked regions in the world, the company presented…

7 years ago

Cybaze ZLab- Yoroi team spotted a new variant of the APT28 Lojax rootkit

Malware researchers at the Cybaze ZLab- Yoroi team spotted a new variant of the dangerous APT28 Lojax rootkit. A new…

7 years ago

tRat is a new modular RAT used by the threat actor TA505

The threat actor TA505 behind many Dridex and Locky campaigns have been using a new Remote Access Trojan (RAT) dubbed tRat. Researchers at…

7 years ago

Boffins discovered seven new Meltdown and Spectre attacks

Researchers who devised the original Meltdown and Spectre attacks disclosed seven new variants that leverage on a technique known as transient…

7 years ago

Cyber espionage group used CVE-2018-8589 Windows Zero-Day in Middle East Attacks

Kaspersky revealed that the CVE-2018-8589  Windows 0-day fixed by Microsoft Nov. 2018 Patch Tuesday has been exploited by at least one APT group…

7 years ago

The ‘MartyMcFly’ investigation: Italian naval industry under attack

Experts at Yoroi’s Cyber Security Defence Center along with Fincantieri’s security team investigated the recently discovered Martymcfly malware attacks. Background…

7 years ago

Hacking the hackers – IOT botnet author adds his own backdoor on top of a ZTE router backdoor

The author of an IoT botnet is distributing a backdoor script for ZTE routers that also includes his own backdoor…

7 years ago

Reading the Android Ecosystem Security Transparency Report

According to Android Ecosystem Security Transparency Report the number of potentially harmful applications has fallen from 0.66% in Lollipop to…

7 years ago

Linux Cryptocurrency miner leverages rootkit to avoid detection

Researchers from Trend Micro spotted a new cryptocurrency miner that leverages a rootkit component to hide its presence on the…

7 years ago

This website uses cookies.