Malware

Updated – The new Wicked Mirai botnet leverages at least three new exploits

Security experts from Fortinet have spotted a new variant of the Mirai botnet dubbed 'Wicked Mirai', it includes new exploits…

8 years ago

Satori Botnet is targeting exposed Ethereum mining pools running the Claymore mining software

While a new variant of the dreaded Mirai botnet, so-called Wicked Mirai, emerged in the wild the operators of the Mirai Satori…

8 years ago

Russian Telegrab malware harvesting Telegram Desktop credentials, cookies, desktop cache, and key files

Cisco Talos researchers have spotted a new variant of Telegrab malware designed to collect information from the Desktop version of…

8 years ago

Mysterious hackers ingenuously reveal two Zero-Days to security community

Mysterious hackers ingenuously reveal two zero-days to the security community, experts collaborated to promptly fix them. Anton Cherepanov, security expert form…

8 years ago

PANDA Banker malware used in several campaigns aimed at banks, cryptocurrency exchanges and social media

  Security firm F5 detailed recently discovered campaigns leveraging the Panda Banker malware to target financial institution, the largest one aimed the…

8 years ago

Nigelthorn malware infected over 100,000 systems abusing Chrome extensions

The Nigelthorn malware has already infected over 100,000 systems in 100 countries by abusing a Google Chrome extension called Nigelify. A…

8 years ago

The source code of the TreasureHunter PoS Malware leaked online

  Security experts at Flashpoint confirmed the availability online for the source code of the TreasureHunter PoS malware since March. The researchers found…

8 years ago

Are you using Python module ‘SSH Decorator’? Newer versions include a backdoor

A backdoor was discovered in the Python module named SSH Decorator (ssh-decorate), that was developed by Israeli developer Uri Goren.…

8 years ago

Reading the 2017 Internet Crime Complaint Center (IC3) report

The FBI’s Internal Crime Complaint Center (IC3) released the FBI 2017 Internet Crime Report, a document that outlines cybercrime trends…

8 years ago

SynAck ransomware Employs Many Novel Techniques to Avoid Detection

The latest variant of the SynAck ransomware now includes a number of novel and complex anti-detection techniques, including one that…

8 years ago

This website uses cookies.