Malware researchers from Kaspersky Lab confirmed the existence of an OS X variant of the Mokes backdoor discovered in January…
CSTO ransomware it is able to query the Google Maps API to discover the victim's location and connects to the…
Security researchers from TrendMicro have published an interesting analysis on the Linux Umbreon rootkit, a new malware developed by a…
Experts from MalwareMustDie spotted a new ELF trojan backdoor, dubbed ELF Linux/Mirai, which is now targeting IoT devices. Experts from…
It has happened again, Mac users who were looking for the BitTorrent client Transmission might have been infected by the…
A joint research conducted by Level 3 Communications and Flashpoint allowed the identification of a million devices infected by the…
Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers linked…
Experts from Kaspersky Lab confirmed that the Lurk cybercrime Gang developed, maintained and rent the infamous Angler Exploit Kit. Security…
Experts from FireEye who analyzed the RIPPER malware believe it was used by crooks in the recent wave of cyber…
The head of Iran’s civilian defense confirmed that a malware was found in petrochemical complexes, but it hasn't caused the…
This website uses cookies.