The source code for a new banking Trojan dubbed Nuclear Bot was leaked online, experts speculate a rapid diffusion of…
According to security experts at Imperva, a newly discovered variant of the Mirai botnet was used to power a 54-hour…
Security researchers at Palo Alto Networks have determined that the Shamoon 2 malware uses a rudimentary technique for network distribution.…
Findings of the MIMICS project conducted by Dragos Threat Operations Center show a malware posing as Siemens PLC application is…
The recently patched CVE-2017-0022 Windows Zero-Day vulnerability has been exploited by threat actors behind the AdGholas malvertising campaign and Neutrino…
Security researchers at MalwareBytes have uncovered a spearphishing campaign that targeted Saudi Arabia Government organizations. Security experts at MalwareBytes have…
Malware researchers at Fortinet have discovered a weaponized Word document that is able to start the infection process on both…
Chinese scammers are deploying rogue cellphone towers to spread the Android Swearing Trojan via malicious URL in SMS messages. Chinese…
The researchers have discovered a new piece of ransomware featuring a Star Trek theme, dubbed Kirk ransomware, the first one…
Security experts at Arbor Networks linked a new Acronym malware to the malicious code used by threat actors behind the…
This website uses cookies.