Malware

New FastPoS PoS malware implements a ‘quickly and dirty’ approach to steal card data

The author of the FastPoS PoS malware issued an update that profoundly changes its behavior, preferring a quick exfiltration activity…

8 years ago

Expert developed a Mac malware that lies in wait for user to start video apps

Mac malware could spy on users by piggybacking on webcam sessions started by legitimate applications such as FaceTime, Skype and…

8 years ago

New Cerber ransomware variant kills common database-related processes

A new variant of the Cerber ransomware kills common database-related processes like those of the MySQL, Oracle and Microsoft SQL…

8 years ago

No doubt, events demonstrate that Signal is the most secure messaging app

Why Signal is considered the most secure instant messaging app? It stores only a few information about its users, and…

8 years ago

The source code of the Mirai IoT botnet leaked online. Do you trust it?

A hacker released the source code of the Mirai malware that powered the record-breaking DDoS attack against the Brian Krebs…

8 years ago

TeamXRat spreads ransomware via RDP brute-force attacks

Malware researchers from Kaspersky have spotted the TeamXRat gang spreading a new ransomware in Brazil via RDP brute-force attacks. Cyber…

8 years ago

Watch out, hacked Steam accounts used as an attack vector

Malware researcher discovered a Reddit user which is warning of the existence of hacked Steam accounts used to spread a…

8 years ago

Necurs botnet: the resurrection of the monster and the rising of spam

Necurs botnet, the monster is resurrected. Banking Trojans and Ransomware propagated via spam is bring backing the high-volume spam campaign…

8 years ago

Cisco Talos profiled the GozNym botnet after cracking the trojan DGA

The Talos team published a detailed analysis of the GozNym botnet, it was possible because the experts cracked the DGA…

8 years ago

Adware Campaign borrows Obfuscation Techniques from Operation Aurora attack

Experts from Carbon Black have spotted a new Adware campaign leveraging on sophisticated obfuscation techniques borrowed from Operation Aurora. Security…

8 years ago

This website uses cookies.