Malware

Frustrating Revelations about Zero-Day Threats and Their Lack of Detection for 2 Whole Months

The recent report from ISTR has outlined the fact that zero-day vulnerabilities remain unresolved for 59 days. What you can…

11 years ago

Tox, how to create your ransomware in 3 steps

McAfee discovered in the Deep Web a ransomware-construction kits that allow easy to build malware in just 3 steps, implementing…

11 years ago

Why Carbanak C&C points to Russia Federal Security Service?

A security researcher at Trend Micro discovered that the malware used by the Carbanak cybergang is using a C&C server…

11 years ago

Fake Android Minecraft apps scammed million users

Experts at ESET have discovered over 30 scareware uploaded to the Google Play store over nine months masquerading as Minecraft…

11 years ago

The Phantom Menace, who targeted the oil tankers?

Panda Security firm released a report regarding a hacking campaign dubbed "Operation Oil Tanker: The Phantom Menace" that targeted oil…

11 years ago

Criminals are using SVG Files to serve malware

Security experts at AppRiver firm have discovered a malicious campaign that is distributing a strain of ransomware via SVG files.…

11 years ago

Ransomware Removal Kit available online for free

A security researcher has compiled the Ransomware Removal kit that could be used in the process of responding to ransomware…

11 years ago

Malicious version of PuTTY is spreading in the wild

Bad actors have released a malicious version of the popular open source tool PuTTY to steal access credentials of computers…

11 years ago

Rombertik destroys the MBR to prevent unauthorized use of the malware

According to the experts at Symantec, the Rombertik malware attempts to destroy the MBR to prevent unauthorized use of the…

11 years ago

mSpy data breach exposes thousand kids to online predators

Recently e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web, thousand…

11 years ago

This website uses cookies.