Malware

Avira spotted a new strain of the dreaded Locky Ransomware in the wildAvira spotted a new strain of the dreaded Locky Ransomware in the wild

Avira spotted a new strain of the dreaded Locky Ransomware in the wild

Avira firm detected a new strain of the Locky ransomware that is spreading through malicious attachments disguised as legitimate Libre and…

7 years ago
TOASTAMIGO – the first known strain of malware that uses the Toast Overlay exploitTOASTAMIGO – the first known strain of malware that uses the Toast Overlay exploit

TOASTAMIGO – the first known strain of malware that uses the Toast Overlay exploit

Trend Micro spotted TOASTAMIGO, the first known malware that uses the recently patched vulnerability that ties with the Toast Overlay attacks.…

7 years ago
Experts explain the Return on Investments in the cybercriminal undergroundExperts explain the Return on Investments in the cybercriminal underground

Experts explain the Return on Investments in the cybercriminal underground

How much is the return on investment in the cybercriminal underground? Let's dig a report recently published by threat intelligence…

7 years ago
Ordinypt is a wiper disguised as ransomware that targets German usersOrdinypt is a wiper disguised as ransomware that targets German users

Ordinypt is a wiper disguised as ransomware that targets German users

Security experts spotted a new malware dubbed Ordinypt, it is a wiper disguised as ransomware that currently only targets German…

7 years ago
Malware signed with stolen Digital code-signing certificates continues to bypass security softwareMalware signed with stolen Digital code-signing certificates continues to bypass security software

Malware signed with stolen Digital code-signing certificates continues to bypass security software

A group of researchers demonstrated that malware signed with stolen Digital code-signing certificates continues to bypass security software. A recent…

7 years ago
The GIBON Ransomware appears in the threat landscapeThe GIBON Ransomware appears in the threat landscape

The GIBON Ransomware appears in the threat landscape

A new strain of ransomware dubbed GIBON ransomware was spotted by the ProofPoint researcher Matthew Mesa that observed it being distributed via malspam. The spam…

7 years ago
Fake WhatsApp app in official Google Play Store downloaded by over a million Android usersFake WhatsApp app in official Google Play Store downloaded by over a million Android users

Fake WhatsApp app in official Google Play Store downloaded by over a million Android users

A fake WhatsApp version deployed on the Play Store was downloaded by over a million users, a failure for the…

7 years ago
Hackers poisoned Google Search results to spread Zeus Panda banking TrojanHackers poisoned Google Search results to spread Zeus Panda banking Trojan

Hackers poisoned Google Search results to spread Zeus Panda banking Trojan

Experts at Cisco Talos observed crooks exploiting black Search Engine Optimization (SEO) to spread the Zeus Panda banking Trojan. Threat actors…

7 years ago
Silence Group is borrowing Carbanak TTPs in ongoing bank attacksSilence Group is borrowing Carbanak TTPs in ongoing bank attacks

Silence Group is borrowing Carbanak TTPs in ongoing bank attacks

A cybercrime gang called Silence targeted at least 10 banks in Russia, Armenia, and Malaysia borrowing hacking techniques from the…

7 years ago
CSE Malware ZLab – Full report of Bad Rabbit attackCSE Malware ZLab – Full report of Bad Rabbit attack

CSE Malware ZLab – Full report of Bad Rabbit attack

The researchers at CSE Cybsec ZLab have completed their analysis the Bad Rabbit ransomware, the report follows our preliminary analysis. Introduction Recently…

7 years ago