Malware

BitDefender found the first MAC OS version of the X-Agent used by the APT28BitDefender found the first MAC OS version of the X-Agent used by the APT28

BitDefender found the first MAC OS version of the X-Agent used by the APT28

Security experts at Bitdefender discovered a MAC OS version of the X-Agent malware used by the Russian APT28 cyberespionage group.…

8 years ago
Experts warn of the rapid growth of the Marcher Android banking TrojanExperts warn of the rapid growth of the Marcher Android banking Trojan

Experts warn of the rapid growth of the Marcher Android banking Trojan

Malware researchers at the security firm Securify have published a detailed analysis of the Marcher Android banking Trojan. Security experts…

8 years ago
Office Loader leverages malicious macros to deliver multiple malwareOffice Loader leverages malicious macros to deliver multiple malware

Office Loader leverages malicious macros to deliver multiple malware

Security researchers at Palo Alto Networks spotted a campaign leveraging Microsoft Office loader using malicious macros to drop multiple malware…

8 years ago
Word documents laced with malicious macros used to hack Apple Mac systemsWord documents laced with malicious macros used to hack Apple Mac systems

Word documents laced with malicious macros used to hack Apple Mac systems

Crooks exploiting Word documents laced with malicious macros to compromise Apple Mac systems exactly in the same way they do…

8 years ago
Kelihos becomes January’s Top 10 ‘Most Wanted’ MalwareKelihos becomes January’s Top 10 ‘Most Wanted’ Malware

Kelihos becomes January’s Top 10 ‘Most Wanted’ Malware

The infamous Kelihos botnet climbed to the top position, while the Conficker worm dropped to fourth on the chart of…

8 years ago
CRYSIS Ransomware is back and crooks are using RDP attacks once againCRYSIS Ransomware is back and crooks are using RDP attacks once again

CRYSIS Ransomware is back and crooks are using RDP attacks once again

CRYSIS Ransomware attacks leveraging brute force via Remote Desktop Protocol (RDP) are still ongoing, mostly targeting US firms in the…

8 years ago
ENISA Threat Landscape Report 2016, who is attacking us, and how?ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA has issued the annual ENISA Threat Landscape Report 2016, a document that synthesizes the emerging trends in cyber security…

8 years ago
High sophisticated Fileless malware infected 140 companies in 40 countriesHigh sophisticated Fileless malware infected 140 companies in 40 countries

High sophisticated Fileless malware infected 140 companies in 40 countries

More than a hundred banks and financial institutions in 40 countries have been infected with a sophisticated fileless malware that…

8 years ago
Researchers at Dr Web spotted a Windows version of the Mirai botResearchers at Dr Web spotted a Windows version of the Mirai bot

Researchers at Dr Web spotted a Windows version of the Mirai bot

Researchers at the antivirus firm Dr.Web discovered a new strain of the Mirai bot, a Windows variant, targeting more ports.…

8 years ago
Iranian hackers are back with the MACDOWNLOADER MAC malwareIranian hackers are back with the MACDOWNLOADER MAC malware

Iranian hackers are back with the MACDOWNLOADER MAC malware

An Iranian espionage group has been using an unsophisticated strain of malware, dubbed MacDownloader, to steal credentials and other data…

8 years ago