Malware

Two CryptoMix Ransomware variants emerged in a few daysTwo CryptoMix Ransomware variants emerged in a few days

Two CryptoMix Ransomware variants emerged in a few days

Two CryptoMix Ransomware variants emerged in a few days, a circumstance that suggests the operators behind the threat are very…

8 years ago
Android Backdoor GhostCtrl can spy on victims and take over Windows SystemsAndroid Backdoor GhostCtrl can spy on victims and take over Windows Systems

Android Backdoor GhostCtrl can spy on victims and take over Windows Systems

The GhostCtrl backdoor, is an OmniRAT-Based Android malware that can spy on victims, steal data and take over Windows System…

8 years ago
NemucodAES ransomware and Kovter trojan bundled in the same campaignsNemucodAES ransomware and Kovter trojan bundled in the same campaigns

NemucodAES ransomware and Kovter trojan bundled in the same campaigns

Security experts at the SANS Institute discovered that that NemucodAES ransomware and Kovter trojan are being delivered together in spam…

8 years ago
Ovidiy Stealer a cheap and efficient infostealer offered for saleOvidiy Stealer a cheap and efficient infostealer offered for sale

Ovidiy Stealer a cheap and efficient infostealer offered for sale

A new infostealer malware dubbed Ovidiy Stealer was offered for sale by a Russia-speaking malware developer that goes online with the…

8 years ago
Wikileaks: CIA HighRise Android malware used to intercept and redirect SMSsWikileaks: CIA HighRise Android malware used to intercept and redirect SMSs

Wikileaks: CIA HighRise Android malware used to intercept and redirect SMSs

Wikileaks released the documentation for HighRise, an Android app used by the CIA to intercept and redirecting SMS messages to…

8 years ago
New PoS Malware LockPoS emerges in the threat landscapeNew PoS Malware LockPoS emerges in the threat landscape

New PoS Malware LockPoS emerges in the threat landscape

A newly discovered Point of Sale (PoS) malware dubbed LockPoS appeared in the wild and it is being delivered through…

8 years ago
Following NotPetya NATO Increases Support for Ukraine’s Cyber DefensesFollowing NotPetya NATO Increases Support for Ukraine’s Cyber Defenses

Following NotPetya NATO Increases Support for Ukraine’s Cyber Defenses

Following the massive NotPetya attack, NATO Increases Support for Ukrainian Cyber Defenses, Ukraine Considers Joining NATO. "Critical Infrastructure" is one…

8 years ago
Calling Artificial Intelligence to Counter Ransomware AttacksCalling Artificial Intelligence to Counter Ransomware Attacks

Calling Artificial Intelligence to Counter Ransomware Attacks

The progression in Artificial Intelligence have incited intense debate worldwide, some experts are calling AI to counter malware attacks In…

8 years ago
Adwind RAT is back, crooks are targeting Aerospace industries in many countriesAdwind RAT is back, crooks are targeting Aerospace industries in many countries

Adwind RAT is back, crooks are targeting Aerospace industries in many countries

Security experts at TrendMicro discovered that the notorious Adwind RAT has resurfaced targeting enterprises in the Aerospace industries worldwide. Crooks are even…

8 years ago
OSX DoK Malware linked to Operation Emmental used to target Swiss Banks againOSX DoK Malware linked to Operation Emmental used to target Swiss Banks again

OSX DoK Malware linked to Operation Emmental used to target Swiss Banks again

Crooks behind the Operation Emmental hacking campaign have started targeting the Swiss banks using a variant of the DoK Mac OS…

8 years ago