Malware

Kelihos becomes January’s Top 10 ‘Most Wanted’ MalwareKelihos becomes January’s Top 10 ‘Most Wanted’ Malware

Kelihos becomes January’s Top 10 ‘Most Wanted’ Malware

The infamous Kelihos botnet climbed to the top position, while the Conficker worm dropped to fourth on the chart of…

8 years ago
CRYSIS Ransomware is back and crooks are using RDP attacks once againCRYSIS Ransomware is back and crooks are using RDP attacks once again

CRYSIS Ransomware is back and crooks are using RDP attacks once again

CRYSIS Ransomware attacks leveraging brute force via Remote Desktop Protocol (RDP) are still ongoing, mostly targeting US firms in the…

8 years ago
ENISA Threat Landscape Report 2016, who is attacking us, and how?ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA has issued the annual ENISA Threat Landscape Report 2016, a document that synthesizes the emerging trends in cyber security…

8 years ago
High sophisticated Fileless malware infected 140 companies in 40 countriesHigh sophisticated Fileless malware infected 140 companies in 40 countries

High sophisticated Fileless malware infected 140 companies in 40 countries

More than a hundred banks and financial institutions in 40 countries have been infected with a sophisticated fileless malware that…

8 years ago
Researchers at Dr Web spotted a Windows version of the Mirai botResearchers at Dr Web spotted a Windows version of the Mirai bot

Researchers at Dr Web spotted a Windows version of the Mirai bot

Researchers at the antivirus firm Dr.Web discovered a new strain of the Mirai bot, a Windows variant, targeting more ports.…

8 years ago
Iranian hackers are back with the MACDOWNLOADER MAC malwareIranian hackers are back with the MACDOWNLOADER MAC malware

Iranian hackers are back with the MACDOWNLOADER MAC malware

An Iranian espionage group has been using an unsophisticated strain of malware, dubbed MacDownloader, to steal credentials and other data…

8 years ago
Phishme observed operators behind Locky and Sage ransomware share delivery infrastructurePhishme observed operators behind Locky and Sage ransomware share delivery infrastructure

Phishme observed operators behind Locky and Sage ransomware share delivery infrastructure

PhishMe security researchers discovered that the Locky and Sage ransomware were recently observed being distributed by the same delivery infrastructure.…

8 years ago
The Slammer worm is back after 13 years to target ancient SQL serversThe Slammer worm is back after 13 years to target ancient SQL servers

The Slammer worm is back after 13 years to target ancient SQL servers

The SQL Slammer worm, one of the most long-lived malware, now seems to be back online to compromise ancient SQL…

8 years ago
Russian cyber espionage group Turla leverages on a new JavaScript MalwareRussian cyber espionage group Turla leverages on a new JavaScript Malware

Russian cyber espionage group Turla leverages on a new JavaScript Malware

The Russia-linked cyber espionage group known as Turla has been using a new piece of JavaScript malware to profile victims,…

8 years ago
A new CryptoShield Ransomware being distributed via EITest campaignA new CryptoShield Ransomware being distributed via EITest campaign

A new CryptoShield Ransomware being distributed via EITest campaign

Security researcher Kafeine discovered a new ransomware dubbed CryptoShield that is being distributed via EITest campaign through the RIG exploit…

8 years ago