The APWG Global Phishing Survey 2H2014 seeks to understand what the phishers are doing, and how, by quantifying the scope…
ThreatConnect has conducted further investigations on the Rombertik malware and traced a malicious sample they analyzed to a Nigeria-based man.…
Security experts discovered a new njRat campaign using old tactics, making use of compromised websites as a third layer, communication…
The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not…
Allegedly, the author of the "Locker" ransomware has uploaded a dump of the C2 server database, releasing private keys of…
New revelations came after a high-profile defector warns of that North Korea’s cyber army has the capability to run cyber attacks that could…
The cyber security expert Michael Fratello has made a detailed analysis of the locker ransomware that implements a unique delivery…
The authors of the popular Angler exploit kit integrated an exploit for a Flash Player flaw fixed by Adobe just…
Linux/Moose is a malware family that targets Linux-based consumer routers turning them into social network bots to use for illegal…
Researchers at FireEye have detected a new strain of point-of-sale (POS) malware being used in the wild and served through…
This website uses cookies.