Malware

CryptoLuck Ransomware spread through the RIG-E Exploit KitCryptoLuck Ransomware spread through the RIG-E Exploit Kit

CryptoLuck Ransomware spread through the RIG-E Exploit Kit

CryptoLuck ransomware is a new strain of malware discovered by the researcher Kafeine, that is being distributed via the RIG-E…

9 years ago
Ransomware: How to recover your encrypted files, the last guide.Ransomware: How to recover your encrypted files, the last guide.

Ransomware: How to recover your encrypted files, the last guide.

In this guide, we will explain how to recover encrypted files focusing on the Data-Locker Ransomware that targets the Windows…

9 years ago
CrySis ransomware decryption keys published onlineCrySis ransomware decryption keys published online

CrySis ransomware decryption keys published online

The decryption keys for the CrySis ransomware were posted online on the BleepingComputer.com forum by a user known as crss7777.…

9 years ago
Telecrypt ransomware abuses Telegram Messenger’s communication protocolTelecrypt ransomware abuses Telegram Messenger’s communication protocol

Telecrypt ransomware abuses Telegram Messenger’s communication protocol

Telecrypt ransomware is a new malware that abuses the instant messaging service Telegram for command and control (C&C) communications. Security…

9 years ago
MalwareMustDie is closed for protest against the NSAMalwareMustDie is closed for protest against the NSA

MalwareMustDie is closed for protest against the NSA

The Legendary Blog of MalwareMustDie is closed for protest against NSA hacking trace of educational and public servers of harmless…

9 years ago
Malvertising campaign delivered Android Svpeng Trojan via a zero-day in ChromeMalvertising campaign delivered Android Svpeng Trojan via a zero-day in Chrome

Malvertising campaign delivered Android Svpeng Trojan via a zero-day in Chrome

Kaspersky discovered a new strain of the Svpeng Trojan delivered through popular news websites using Google’s AdSense via a zero-day…

9 years ago
Technical analysis of the Locker virus on mobile phonesTechnical analysis of the Locker virus on mobile phones

Technical analysis of the Locker virus on mobile phones

Security experts from Cheetah Mobile Security Research Lab published an interesting Technical analysis of the mobile variant of the Locker…

9 years ago
Commercial Exaspy spyware used to target high-level executivesCommercial Exaspy spyware used to target high-level executives

Commercial Exaspy spyware used to target high-level executives

Security researchers at Skycure have discovered a new commodity Android Spyware, dubbed Exaspy, targeting high-level executives. While in many countries…

9 years ago
Malware used to spy Iran’s nuclear negotiations in the Geneve’s venueMalware used to spy Iran’s nuclear negotiations in the Geneve’s venue

Malware used to spy Iran’s nuclear negotiations in the Geneve’s venue

Switzerland’s attorney general has confirmed to have investigated the presence of spyware in a venue that also hosted talks on…

9 years ago
Shadows Kill Mirai Botnet caused an Internet outage in Liberia, what is the next one?Shadows Kill Mirai Botnet caused an Internet outage in Liberia, what is the next one?

Shadows Kill Mirai Botnet caused an Internet outage in Liberia, what is the next one?

Mirai botnet was used to power a massive DDoS attack against Liberia causing the Internet outage in the entire country…

9 years ago