Malware

A new variant of HawkEye stealer emerges in the threat landscape

A new variant of the HawkEye data stealer emerges in the threat landscape as part of ongoing malware distribution campaigns.…

7 years ago

FireEye releases FLASHMINGO tool to analyze Adobe Flash files

Cyber security firm FireEye announced the release of FLASHMINGO, a new open source tool designed to automate the analysis of…

7 years ago

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading

Scranos is a powerful cross-platform rootkit-enabled spyware discovered while investigating malware posing as legitimate software like video players, drivers and…

7 years ago

Romanian duo convicted of fraud Scheme infecting 400,000 computers

Two Romanian hackers are convicted of infecting 400,000 computers in the U.S. with malicious code and stole millions of dollars…

7 years ago

Malware campaign uses multiple propagation methods, including EternalBlue

Hackers are using the EternalBlue exploit and leveraging advantage of Living off the Land (LotL) obfuscated PowerShell-based scripts to deliver…

7 years ago

Emsisoft released a free decryptor for CryptoPokemon ransomware

Good news for the victims of the CryptoPokemon ransomware, security experts at Emsisoft just released a free decrypter tool. Victims…

7 years ago

FBI/DHS MAR report details HOPLIGHT Trojan used by Hidden Cobra APT

According to a joint report published by the United States Department of Homeland Security (DHS) and Federal Bureau of Investigation…

7 years ago

[SI-LAB] EMOTET spread in Chile impacted hundreds of users and targeted financial and banking services

EMOTET spread in Chile targeted financial and banking services. SI-LAB detected hundreds of users that were impacted by this malware…

7 years ago

Sophisticated TajMahal APT Framework remained under the radar for 5 years

Cybersecurity experts at Kaspersky Lab uncovered a highly sophisticated spyware framework dubbed TajMahal that was involved in cyberespionage campaign for…

7 years ago

Yoroi Welcomes “Yomi: The Malware Hunter”

Yomi’s malware engine implements a multi-analysis approach that is able to exploit both: static analysis and behavioral analysis, enjoy it"…

7 years ago

This website uses cookies.