Malware

Adware Campaign borrows Obfuscation Techniques from Operation Aurora attack

Experts from Carbon Black have spotted a new Adware campaign leveraging on sophisticated obfuscation techniques borrowed from Operation Aurora. Security…

8 years ago

How much time does it take to create a malware that evades antimalware solutions? One or two minutes

A Group of the researchers from the Iswatlab team at the University of Sannio demonstrated how is easy to create…

8 years ago

Fancy Bear Hackers use a new Mac Trojan against aerospace industry

Researchers at Palo Alto spotted a new campaign of the Russian Fancy Bear APT using a new Mac OS X…

8 years ago

The Libyan Scorpions group is behind a cyber espionage campaign in Lybia

The Cyberkov Security Incident Response team spotted a cyber espionage campaign in Lybia conducted by a group named Libyan Scorpions.…

8 years ago

Security firm Sucuri analyzed tens of thousands of compromised websites

Security firm Sucuri published a detailed study, titled Hacked Website Report for 2016/Q2, on compromised websites on the Internet. According to…

8 years ago

RAUM tool allows to spread malware through torrent files

InfoArmor has discovered the RAUM tool in criminal forums, it is a special tool to distribute malware by packaging it…

8 years ago

iSpy, a new sophisticated commercial keylogger in the criminal underground

The new variant of the popular iSpy keylogger (version 3.x) was available in the criminal underground with sophisticated features. Security…

8 years ago

Italian security firm spotted BadEpilogue: The Perfect Evasion

Security firm Certego has been detecting multiple viral spam campaigns leveraging a new malware evasion technique it called BadEpilogue. Starting…

8 years ago

Experts found apps in Google Play serving the Overseer malware to overseas travelers

Google has removed from the Google Play store four apps trojanized with the Overseer malware to target overseas travelers seeking…

8 years ago

Vawtrak v2, a close look at the cybercriminal groups behind the threat

Security experts from the cyber threat intelligence firm Blueliv have published a report on the banking Trojan Vawtrak v2 its…

8 years ago

This website uses cookies.