Malware

City of Spring Hill in Tennessee still hasn’t recovered from ransomware attack

In early November, the City of Spring Hill, Tenn, suffered a ransomware attack, but it still hasn't recovered from attack…

8 years ago

Kaspersky provided further details on NSA Incident. Other APTs targeted the same PC

Kaspersky Lab publishes a full technical report related to hack of its antivirus software to steal NSA hacking code. In…

8 years ago

Terdot Banking Trojan is back and it now implements espionage capabilities

The Terdot banking Trojan isn't a novelty in the threat landscape, it has been around since mid-2016, and now it is…

8 years ago

Multi-Stage Android/TrojanDropper.Agent.BKY Malware bypasses Google Play detection once again

Researchers from security firm ESET, discovered a multi-stage Malware dubbed Android/TrojanDropper.Agent.BKY that evaded Google Play detection. Security experts at ESET have discovered…

8 years ago

US DHS and FBI share reports on FALLCHILL and Volgmer malware used by North Korean Hidden Cobra APT

US DHS published the details of the malware FALLCHILL and Volgmer used by the APT group Hidden Cobra that is linked to…

8 years ago

IcedID, a new sophisticated banking Trojan doesn’t borrow code from other banking malware

Researchers at IBM have spotted a new banking malware dubbed IcedID has capabilities similar to other financial threats like Gozi, Zeus, and…

8 years ago

A China-linked cyber espionage group has been using a new strain of malware dubbed Reaver

Experts at Palo Alto Networks have discovered a new malware family named Reaver with ties to hackers who use the…

8 years ago

Avira spotted a new strain of the dreaded Locky Ransomware in the wild

Avira firm detected a new strain of the Locky ransomware that is spreading through malicious attachments disguised as legitimate Libre and…

8 years ago

TOASTAMIGO – the first known strain of malware that uses the Toast Overlay exploit

Trend Micro spotted TOASTAMIGO, the first known malware that uses the recently patched vulnerability that ties with the Toast Overlay attacks.…

8 years ago

Experts explain the Return on Investments in the cybercriminal underground

How much is the return on investment in the cybercriminal underground? Let's dig a report recently published by threat intelligence…

8 years ago

This website uses cookies.