Malware

ImageGate attack – How to spread malware via poisoned .JPGImageGate attack – How to spread malware via poisoned .JPG

ImageGate attack – How to spread malware via poisoned .JPG

Security experts from Checkpoint have discovered a new malware-based campaign through Facebook leveraging an image obfuscation trick dubbed ImageGate. Security…

9 years ago

ESET Crysis decryptor to rescue files encrypted by the Crysis ransomware

ESET security firm has included master decryption keys into a decryption tool that allows rescuing the encrypted files without paying…

9 years ago
Ask.com infected toolbar gets stopped in its tracks before it gets startedAsk.com infected toolbar gets stopped in its tracks before it gets started

Ask.com infected toolbar gets stopped in its tracks before it gets started

Security experts at Red Canary discovered attackers who were trying to use the Ask.com Toolbar as a vector to spread…

9 years ago
Watch out, Locky ransomware spread via SVG images on Facebook MessengerWatch out, Locky ransomware spread via SVG images on Facebook Messenger

Watch out, Locky ransomware spread via SVG images on Facebook Messenger

Researchers have discovered a new hacking campaign leveraging on Facebook Messenger to spread the Locky ransomware via SVG images. The Locky Ransomware…

9 years ago
An Android Spyware revealed the existence of a new Italian surveillance firmAn Android Spyware revealed the existence of a new Italian surveillance firm

An Android Spyware revealed the existence of a new Italian surveillance firm

A strain of Android spyware recently analyzed by security experts from RedNaga Security team points to an another Italian company.…

9 years ago
How the Mirai botnet hacks a security camera in a few secondsHow the Mirai botnet hacks a security camera in a few seconds

How the Mirai botnet hacks a security camera in a few seconds

The popular security expert Robert Graham, CEO of Errata Security, has explained how the Mirai botnet could hack a security…

9 years ago
Mirai botnet leverages STOMP Protocol to power DDoS attacksMirai botnet leverages STOMP Protocol to power DDoS attacks

Mirai botnet leverages STOMP Protocol to power DDoS attacks

Cyber criminals are exploiting the capability of the Mirai botnet to use the STOMP Protocol to launch massive DDoS attacks.…

9 years ago
CryptoLuck Ransomware spread through the RIG-E Exploit KitCryptoLuck Ransomware spread through the RIG-E Exploit Kit

CryptoLuck Ransomware spread through the RIG-E Exploit Kit

CryptoLuck ransomware is a new strain of malware discovered by the researcher Kafeine, that is being distributed via the RIG-E…

9 years ago
Ransomware: How to recover your encrypted files, the last guide.Ransomware: How to recover your encrypted files, the last guide.

Ransomware: How to recover your encrypted files, the last guide.

In this guide, we will explain how to recover encrypted files focusing on the Data-Locker Ransomware that targets the Windows…

9 years ago
CrySis ransomware decryption keys published onlineCrySis ransomware decryption keys published online

CrySis ransomware decryption keys published online

The decryption keys for the CrySis ransomware were posted online on the BleepingComputer.com forum by a user known as crss7777.…

9 years ago