Malware

A flaw in TeslaCrypt ransomware allows file recovering

The victims of the infamous TeslaCrypt ransomware can now rejoice, there is a free tool to decrypt files encrypted by…

10 years ago

Operators behind Angler Exploit Kit included CryptoWall 4.0

The latest variant of CryptoWall 4.0, one of the most popular and dangerous ransomware threats, has been recently added to the infamous…

10 years ago

Be careful Facebook users, you are under attack!

Facebook users are receiving malicious email delivering malware masquerading as audio message, a similar campaign also targeted WhatsApp users. Social…

10 years ago

A new Drydex campaign targeted British businesses

Security experts at IBM X-Force team discovered a new hacking campaign based on the infamous Dridex trojan. Security experts at…

10 years ago

Asacub Android Malware, the multiform threat

Asacub is a new Android threat that has been used by bad actors to infect thousands of users in Russia in…

10 years ago

Linux.Ekoms.1 the Linux trojan that takes screenshots

Dr Web discovered a new Malware dubbed Linux.Ekoms.1 designed to target Linux systems and takes screenshots every 30 seconds. Security…

10 years ago

Tinba, a 20KB trojan that scares banks in Singapore and Indonesia

A new variant of the infamous Tinba banking trojan has emerged in the wild and is targeting financial institutions in…

10 years ago

Some facts that probably you still ignore on the Stuxnet attack

A collection of interesting info about the Stuxnet attack published years ago by The New York Times, a must-read for…

10 years ago

Law enforcement arrested operators behind the MegalodonHTTP Botnet

The operators behind the MegalodonHTTP botnet have been arrested in an international joint effort of law enforcement and a private…

10 years ago

Hyatt hotels data breach, 250 hotels impacted in 50 countries

The Hyatt Hotels Corporation announced a total of 250 of its resorts were compromised last year in a malware-based attack…

10 years ago

This website uses cookies.