Malware developers have presented two proof-of-concept malware, a rootkit and a keylogger, which exploit the GPU of the infected host. Malware authors always demonstrate a great creativity and the ability to propose even more effective solutions, recently developers have published two strains of malware, Jellyfish rootkit and the Demon keylogger, that implement an unusual way to run on a victim’s […]
AlphaCrypt ransomware is a new type of ransomware has been detected by security expert in the wild. The malware is delivered via Angler Exploit kit. Ransomware is among most popular malware families in the criminal underground, recently security firms have discovered numerous variant targeting desktop and mobile platforms. Recently a new strain of ransomware dubbed […]
Canadian mobile users were targeted by the latest variant of the Koler Android mobile ransomware after visiting websites proposing adult content. Once again, visitors of websites proposing adult content are targeted by cyber criminals. Last week a malvertising campaign hit visitors of the adult website XHamster, now Canadian Internet users victims were targeted by a […]
Rombertik is the name of a high sophisticated strain of malware spotted by the researcher of the Cisco Talos Team, it wipes hard drive to prevent analysis. Security experts have uncovered new strain of malware dubbed Rombertik malware that implements high sophisticated evasion detection technique and analysis, it also includes the ability to delete victim’s […]
The sophisticated Mumblehard spamming malware infects thousands of Linux and FreeBSD servers going under the radar for at least five years. In the last seven months, several thousand Linux and FreeBSD machines have been infected with a sophisticated malware dubbed Mumblehard. The infected machines were part of a botnet used, in the last five years, to […]
Microsoft is observing a major spike in the volume of malware using macros since the beginning of the year. The infection method was very common in the past I remember when I was starting my career, around 2006 that a lot of the existent malware would arrive to their victims trough Word/Excel macros, and that […]
A New malvertising campaign hit adult website xHamster by abusing ad provider TrafficHaus and exploiting the Googleâs URL shortener service. Malversting campaigns are becoming a serious problem for web users, cyber criminals are exploiting this practice to infect wide audience of users that visit most popular websites. In January security experts at Cyphort firm discovered a […]
Computer malware Infections are dramatically increasing, it is time to assume a proper security posture to protect every single note of a global network. Infections from malicious software — harmful code that’s also known as malware and that includes things like computer viruses and worms — are keeping repair specialists like in Kaspersky, Sophos, and […]
WattsUpDoc is a platform developed by two researchers for the monitoring of medical devices and detection of potentially “life-threatening malware.” Two US Hospitals will start using a system that can detect malware infections of medical devices, the technique relies on a probe that monitors the AC power consumption of the units. The hospitals (name were […]
How many infected Point-of-Sale terminals are infected worldwide and how is evolving the cyber threat? Here you are the opinion of the expert. Security experts at IntelCrawler threat intelligence firm are among the team of researchers more active against Point-of-Sale (PoS) malware. IntelCrawler  The team conducted several investigations in the past and continuously monitor the evolution of […]