Malware

Crooks are improving sextortion with the use of mobile malware

According to Trend Micro, crooks in Asia are conducting the sextortion practice to the next level, including the used of…

11 years ago

Vawtrak malware uses steganography to hide update files in favicons

A new strain of Vawtrak malware implements capabilities to send and receive data through encrypted favicons distributed over the Tor…

11 years ago

New Dridex malware evades detection with AutoClose function

Security experts at Proofpoint have discovered a new phishing campaign that exploits a Dridex variant that evades detection with AutoClose…

11 years ago

PoSeidon the most sophisticated PoS malware until now

Cisco Security Team has spotted in the wild a new Point-of-Sale malware dubbed PoSeidon that is more sophisticated than previously…

11 years ago

Operation Woolen Goldfish, a hacking campaign in the wild

Security experts at Trend micro uncovered a new hacking campaign dubbed Operation Woolen Goldfish likely run by a threat actor…

11 years ago

Researchers developed a new powerful BIOS Bootkit that exploits BIOS flaws

Security researchers developed a new BIOS bootkit that exploit recently discovered vulnerabilities. The experts will present their study to the…

11 years ago

South Korea – Hacker requests money for data on nuclear plants

Hacker who posted online information on Nuclear Plants in South Korea demands money for not selling other sensitive information to…

11 years ago

A new Facebook Worm exploits multiple cloud services

Security Experts at Malwarebytes security firm spotted a new  Facebook worm that spreads itself by leveraging multiple cloud services. Social…

11 years ago

Microsoft tries to fix again LNK flaw exploited by Stuxnet

A security bulletin recently released by Microsoft addresses the LNK flaw that was exploited by Stuxnet and that we have…

11 years ago

Malware “TreasureHunter” innovates by using windows products IDs for its dynamic mutex

A new approach based on windows products IDs for dynamic mutex could allow the creation of new malware running undetected…

11 years ago

This website uses cookies.