Malware

ENISA Threat Landscape Report 2016, who is attacking us, and how?ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA has issued the annual ENISA Threat Landscape Report 2016, a document that synthesizes the emerging trends in cyber security…

8 years ago
High sophisticated Fileless malware infected 140 companies in 40 countriesHigh sophisticated Fileless malware infected 140 companies in 40 countries

High sophisticated Fileless malware infected 140 companies in 40 countries

More than a hundred banks and financial institutions in 40 countries have been infected with a sophisticated fileless malware that…

8 years ago
Researchers at Dr Web spotted a Windows version of the Mirai botResearchers at Dr Web spotted a Windows version of the Mirai bot

Researchers at Dr Web spotted a Windows version of the Mirai bot

Researchers at the antivirus firm Dr.Web discovered a new strain of the Mirai bot, a Windows variant, targeting more ports.…

8 years ago
Iranian hackers are back with the MACDOWNLOADER MAC malwareIranian hackers are back with the MACDOWNLOADER MAC malware

Iranian hackers are back with the MACDOWNLOADER MAC malware

An Iranian espionage group has been using an unsophisticated strain of malware, dubbed MacDownloader, to steal credentials and other data…

8 years ago
Phishme observed operators behind Locky and Sage ransomware share delivery infrastructurePhishme observed operators behind Locky and Sage ransomware share delivery infrastructure

Phishme observed operators behind Locky and Sage ransomware share delivery infrastructure

PhishMe security researchers discovered that the Locky and Sage ransomware were recently observed being distributed by the same delivery infrastructure.…

8 years ago
The Slammer worm is back after 13 years to target ancient SQL serversThe Slammer worm is back after 13 years to target ancient SQL servers

The Slammer worm is back after 13 years to target ancient SQL servers

The SQL Slammer worm, one of the most long-lived malware, now seems to be back online to compromise ancient SQL…

8 years ago
Russian cyber espionage group Turla leverages on a new JavaScript MalwareRussian cyber espionage group Turla leverages on a new JavaScript Malware

Russian cyber espionage group Turla leverages on a new JavaScript Malware

The Russia-linked cyber espionage group known as Turla has been using a new piece of JavaScript malware to profile victims,…

8 years ago
A new CryptoShield Ransomware being distributed via EITest campaignA new CryptoShield Ransomware being distributed via EITest campaign

A new CryptoShield Ransomware being distributed via EITest campaign

Security researcher Kafeine discovered a new ransomware dubbed CryptoShield that is being distributed via EITest campaign through the RIG exploit…

8 years ago
Ransomware shutdown 70% of Washington DC CCTV ahead of President’s inaugurationRansomware shutdown 70% of Washington DC CCTV ahead of President’s inauguration

Ransomware shutdown 70% of Washington DC CCTV ahead of President’s inauguration

A Ransomware attack compromised 70% of Washington DC CCTV ahead of inauguration of President Trump, technical staff wiped and rebooted…

8 years ago
Last Dridex Trojan variant uses a new tactic to bypass Windows UACLast Dridex Trojan variant uses a new tactic to bypass Windows UAC

Last Dridex Trojan variant uses a new tactic to bypass Windows UAC

A new variant of the Dridex Trojan recently observed is leveraging a new tactic to bypass the UAC (User Account…

8 years ago