Malware

Pokemon-fan VXer developed the Linux Umbreon rootkit

Security researchers from TrendMicro have published an interesting analysis on the Linux Umbreon rootkit, a new malware developed by a…

8 years ago

Linux/Mirai ELF, when malware is recycled could be still dangerous

Experts from MalwareMustDie spotted a new ELF trojan backdoor, dubbed ELF Linux/Mirai,  which is now targeting IoT devices. Experts from…

8 years ago

BitTorrent client Transmission found distributing Mac malware once again

It has happened again, Mac users who were looking for the BitTorrent client Transmission might have been infected by the…

8 years ago

BASHLITE Botnets peaked 1 Million Internet of Thing Devices

A joint research conducted by Level 3 Communications and Flashpoint allowed the identification of a million devices infected by the…

8 years ago

iOS 9.3.4 and minor versions are vulnerable to the Trident Exploit

Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers linked…

8 years ago

Lurk cybercrime Gang developed, maintained and rent the Angler EK

Experts from Kaspersky Lab confirmed that the Lurk cybercrime Gang developed, maintained and rent the infamous Angler Exploit Kit. Security…

8 years ago

The RIPPER malware linked to the recent ATM attacks in Thailand

Experts from FireEye  who analyzed the RIPPER malware believe it was used by crooks in the recent wave of cyber…

8 years ago

A malware was found in Iran petrochemical complexes, but it’s not linked to recent incidents

The head of Iran’s civilian defense confirmed that a malware was found in petrochemical complexes, but it hasn't caused the…

8 years ago

New Locky Ransomware variant uses DLLs for distribution

A new Locky Ransomware variant has been spotted by researchers at Cyren, it uses DLLs for distribution. The Locky Ransomware is one…

8 years ago

Apple fixed Zero-Days flaws exploited by nation-state spyware

Apple issued emergency iOS updates to patch three Zero-Days exploited by a government spyware in an high-sophisticated attack. Apple has…

8 years ago

This website uses cookies.