Malware

Watch out, hacked Steam accounts used as an attack vector

Malware researcher discovered a Reddit user which is warning of the existence of hacked Steam accounts used to spread a…

9 years ago

Necurs botnet: the resurrection of the monster and the rising of spam

Necurs botnet, the monster is resurrected. Banking Trojans and Ransomware propagated via spam is bring backing the high-volume spam campaign…

9 years ago

Cisco Talos profiled the GozNym botnet after cracking the trojan DGA

The Talos team published a detailed analysis of the GozNym botnet, it was possible because the experts cracked the DGA…

9 years ago

Adware Campaign borrows Obfuscation Techniques from Operation Aurora attack

Experts from Carbon Black have spotted a new Adware campaign leveraging on sophisticated obfuscation techniques borrowed from Operation Aurora. Security…

9 years ago

How much time does it take to create a malware that evades antimalware solutions? One or two minutes

A Group of the researchers from the Iswatlab team at the University of Sannio demonstrated how is easy to create…

9 years ago

Fancy Bear Hackers use a new Mac Trojan against aerospace industry

Researchers at Palo Alto spotted a new campaign of the Russian Fancy Bear APT using a new Mac OS X…

9 years ago

The Libyan Scorpions group is behind a cyber espionage campaign in Lybia

The Cyberkov Security Incident Response team spotted a cyber espionage campaign in Lybia conducted by a group named Libyan Scorpions.…

9 years ago

Security firm Sucuri analyzed tens of thousands of compromised websites

Security firm Sucuri published a detailed study, titled Hacked Website Report for 2016/Q2, on compromised websites on the Internet. According to…

9 years ago

RAUM tool allows to spread malware through torrent files

InfoArmor has discovered the RAUM tool in criminal forums, it is a special tool to distribute malware by packaging it…

9 years ago

iSpy, a new sophisticated commercial keylogger in the criminal underground

The new variant of the popular iSpy keylogger (version 3.x) was available in the criminal underground with sophisticated features. Security…

9 years ago

This website uses cookies.