Malware

Victims of Jaff Ransomware now can decrypt their locked files for free thanks to Kaspersky

Victims of the Jaff ransomware can use an updated version of the Kaspersky Labs's RakhniDecryptor tool to decrypt their encrypted…

9 years ago

MACSPY – Remote Access Trojan as a service on Dark web

Reporters for the online service "Bleeping Computer" have uncovered a new threat to Apple being offered on the dark web,…

9 years ago

Emerging Matrix Banker Trojan is targeting banks in Latin America

Security Experts at Arbor Networks have spotted a new banking trojan, initially called 'Matrix Banker', that is targeting Latin America.…

9 years ago

Experts spotted Industroyer ICS Malware and linked it to Ukraine Power Outage

Researchers at antivirus firm ESET have discovered a new strain of malware, dubbed Industroyer, that appears to have been designed…

9 years ago

MacRansom: The first Mac ransomware offered as a RaaS Service

Malware researchers at security firm Fortinet have spotted MacRansom, it is the first Mac ransomware offered as a RaaS Service. Malware…

9 years ago

Police seized two Tor relays investigating WannaCry attack, others disappeared in the same period

France’s cyber-crime investigation unit OCLCTIC seized one server running two Tor Relays Investigating the WannaCry attack. A few days after…

9 years ago

Mouseover PowerPoint attack exploited to deliver the Gootkit Trojan

Experts at Trend Micro observed a spam campaign leveraging the PowerPoint 'Mouseover' attack to deliver the Gootkit banking Trojan. Earlier…

9 years ago

Hundred of thousands of IP Cameras Hijacked by Persirai and other thingbots

Thousands of IP cameras have been hijacked by the Persirai IoT botnet that targets more than 1,000 IP camera models,…

9 years ago

A new Linux Malware targets Raspberry Pi devices to mine Cryptocurrency

Security researchers at Dr. Web discovered two new Linux Malware, one of them mines for cryptocurrency using Raspberry Pi Devices.…

9 years ago

Turla APT malware now retrieves C&C address from Instagram comments

A malicious code used by Turla APT in a recent campaign leverages comments posted to Instagram to obtain the address…

9 years ago

This website uses cookies.