Malware

Operation Ke3chang, alleged Chinese hackers target Indian Embassies Worldwide

Security experts from PaloAlto Networks collected evidence that the Operation Ke3chang discovered by FireEye in 2013 is still ongoing. Back…

10 years ago

Cyberespionage against RUAG, from Red October to Turla, who is the culprit?

Security experts from Melani published a detailed technical report about the strain of Turla used in the cyberespionage attack against…

10 years ago

Magnitude EK authors are integrating exploit code for CVE-2016-4117 Adobe flaw

The authors of the Magnitude exploit kit are integrating the exploit code for the CVE-2016-411 Adobe Flash Player vulnerability. Recently…

10 years ago

Microsoft warns of malicious macros using a new sneaky trick

Researchers at the Microsoft’s Malware Protection Center are warning of a new wave of attacks leveraging malicious macros using a…

10 years ago

Teslacrypt decryption tool allows victims to restore their files

A security researcher from ESET security firm issue a Teslacrypt decryption tool after the author closed the project and released…

10 years ago

Skimer malware evolves, it is used to target ATMs

Experts at Kaspersky Lab have detected a new variant of  the Skimer malware used to steal money and payment card…

10 years ago

Redirector.Paco, a Million-Machine Clickfraud Botnet

According to the experts at Bitdefender an HTTPS hijacking click-fraud botnet dubbed Redirector.Paco infected almost 1 million devices since now.…

10 years ago

Experts also cracked the CryptXXX ransomware 2.0

Security Experts at Kaspersky have updated their decryption tool to adapt to the second version of CryptXXX ransomware in the…

10 years ago

Week in Ransomware – Week of May 13th, 2016

Just in a week several new ransomware variants, services, and updates have been discovered in-the-wild, disclosed publicly, and thoroughly analyzed.…

10 years ago

Malware used in the recent banking cyberheists is linked to Sony Pictures hack

Experts at the BAE security firms collected evidence that demonstrates the malware used in the recent cyberheists is linked to…

10 years ago

This website uses cookies.