Malware

TeamSpy malware is back, it transforms TeamViewer into a spying software

Security experts from Heimdal Security discovered a new spam campaign over the weekend leveraging the TeamSpy malware to spy in…

8 years ago

Here you are the distribution network behind the Ursnif banking Trojan

The security experts at Palo Alto Networks published a detailed analysis of the architecture used to spread the Ursnif banking…

8 years ago

Mobile car apps implement poor security measures advantaging car thieves

Experts at Kaspersky Lab have analyzed several Android car apps and discovered that most of them lack proper security features…

8 years ago

The ViperRAT APT group is targeting the Israeli Defense Force

A group of hackers tracked as ViperRAT is spying on the Israeli military by hacking into the soldiers' personal Android…

8 years ago

A new SQL malware Targets online shops running on Magento

Security experts have discovered a new SQL malware targeting online shops running on Magento that hides the code in the…

8 years ago

IBM shares details on the attack chain for the Shamoon malware

Security experts at IBM published a report that includes precious details on the attack chain of the dreader Shamoon cyberweapon.…

8 years ago

BitDefender found the first MAC OS version of the X-Agent used by the APT28

Security experts at Bitdefender discovered a MAC OS version of the X-Agent malware used by the Russian APT28 cyberespionage group.…

8 years ago

Experts warn of the rapid growth of the Marcher Android banking Trojan

Malware researchers at the security firm Securify have published a detailed analysis of the Marcher Android banking Trojan. Security experts…

8 years ago

Office Loader leverages malicious macros to deliver multiple malware

Security researchers at Palo Alto Networks spotted a campaign leveraging Microsoft Office loader using malicious macros to drop multiple malware…

8 years ago

Word documents laced with malicious macros used to hack Apple Mac systems

Crooks exploiting Word documents laced with malicious macros to compromise Apple Mac systems exactly in the same way they do…

8 years ago

This website uses cookies.