Version 3.0 of the RIG exploit kit has been released with new significant improvement. It has already infected more than 1.3 million PC worldwide. Early 2015, part of the source code for the 2.0 version of the RIG exploit kit was leaked online due to a dispute between the main developer and a reseller. According […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. HORNET, the High-Speed Tor-Like encrypted anonymous network Anonymousâs team GhostSec thwarts Isis terror plots Drone Firing Semi-Automatic Handgun, whatâs next? Advertising hijacking made by Invisible rogue mobile apps are […]
Experts at Trend Micro discovered that cyber criminals are exploiting the popular Angler Exploit kit to find and infect PoS systems. The popular Angler Exploit kit is used by criminal crews to find and infect PoS systems, this is the last disconcerting discovery made by the experts at Trend Micro. The security researcher Anthony Joe […]
Security Firm Cyphort Labs reported that 10 million users may have been infected in ten days by a malvertising and exploit kit campaign. Nick Bilogorskiy, a security researcher at Cyphort  revealed that 10 million users may have been infected in ten days due to a malvertising and exploit kit campaign. According to the expert threat actors […]
Mobile Malware is growing and crooks are targeting the advertising industry to redirect users to ad pages in a sort of Advertising hijacking. Mobile Malware is growing and crooks are targeting the advertising industry with malicious codes able to redirect users to ad pages, this practice is known as Advertising hijacking. These “rogue mobile apps” […]
FireEye published a report on the operations of a group of 419 scammers located in Nigeria, which is using malware as a component of their fraud scams. Security firm FireEye has published a new report on a new group of 419 scammers that is using keyloggers and other malware to implement its fraud scheme. According to the investigators, the fraudsters diverted potentially millions […]
Android devices, from Ice Cream version to Jelly Bean were p0wned with RCSAndroid RAT, one of the most professionally developed and sophisticated malware. Since the leak of Hacking Team hack, every day in security area have been inundated with news about some vulnerability, exploit, etc. etc., and still more news are yet to come out. […]
Researchers have spotted a new strain of the Bartalex macro-based malware that is used to drop the Pony loader malware and the popular Dyre banking Trojan. Bartalex is a macro-based malware that was first discovered earlier this year, security researchers have spotted a new strain of this malicious code dropping the Pony loader malware and the popular Dyre banking […]
Researchers at Rook Security have released a free tool, called Milano, that is able to detect the presence of HackingTeam malware on target systems. Researchers at Rook Security have released a free tool, called Milano, that is able to detect the presence of HackingTeam malware on target systems. The experts have also published a set […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. A new Zero-Day Vulnerability arises from Hacking Team hack Hacking Team Another Flash Zero-Day: CVE-2015-5122 Hacking Team by Numbers â The Infographic Hacking Team chief: Were the GOOD GUYS […]