Malware

Cerber Ransomware now includes a feature to avoid canary files anti-malware

Researchers at Cybereason have discovered a new strain of the Cerber ransomware that implements a new feature to avoid triggering canary…

7 years ago

ShadowPad backdoor was spread in corporate networks through software update mechanism

Kaspersky Lab discovered attackers were able to modify the NetSarang software update process to include a malware tracked as ShadowPad…

7 years ago

CVE-2017-0199: Crooks exploit PowerPoint Slide Show files to deliver malware

According to Trend Micro, cyber criminals abuse the CVE-2017-0199 vulnerability to deliver malware via PowerPoint Slide Show. In April Microsoft fixed the CVE-2017-0199  vulnerability…

7 years ago

The Disdain exploit kit appears in the threat landscape

The Disdain exploit kit is available for rent on a daily, weekly, or monthly basis for prices of $80, $500,…

7 years ago

MUGHTHESEC, a signed Mac adware that hijacks the victim’s browser for profit

Experts spotted a new signed Mac adware dubbed MUGHTHESEC that hijacks victim's browser for profit and can be removed only…

7 years ago

Anti-Israel and pro-Palestinian IsraBye wiper spreads as a ransomware

Malware researchers discovered an anti-Israel & pro-Palestinian data wiper dubbed IsraBye that is spreading as a ransomware. Malware researcher Jakub…

7 years ago

DNA Contains Instructions for Biological and Computer Viruses

University of Washington scientists have created an experiment that shows how DNA can be used to not only create biologic…

7 years ago

Ukrainian Man charged with spreading the NotPetya ransomware

The Cyber Police of Ukraine arrested a Ukraine man that allegedly distributed the NotPetya/ExPetr malware resulting in the infection of…

7 years ago

Malware campaign targets Russian-Speaking companies with a new Backdoor

Trend Micro spotted a new espionage campaign that has been active for at least 2 months and that is targeting Russian-speaking…

7 years ago

Experts found a link between the KONNI attacks and DarkHotel campaigns against NK

Experts at Cylance noticed that the decoy document used in KONNI attacks is similar to the one used in recent campaigns of…

7 years ago

This website uses cookies.