Exclusive: MalwareMustDie analyzes a new IoT malware dubbed Linux/ AirDropBot

6 years ago

After 2 years of waiting, MalwareMustDie returns with an excellent page of malware analysis of a new IoT malware: Linux/AirDropBot.…

Iran’s oil minister orders ‘Full Alert’ for oil sector on against attacks

6 years ago

Iran 's oil minister on Sunday ordered representatives of the energy sector to be on 'full alert' to the threat…

Arcane Stealer V, a threat for lower-skilled adversaries that scares experts

6 years ago

Experts recently analyzed an information-stealing malware tracked as Arcane Stealer V that is very cheap and easy to buy in…

Microsoft will add new file types to the list of blocked ones in Outlook on the Web

6 years ago

Microsoft announced last week it is going to expand the list of file extensions that are blocked in Outlook on…

Phishers continue to abuse Adobe and Google Open Redirects

6 years ago

Adobe and Google Open Redirects Abused by Phishing Campaigns Experts reported that phishing campaigns are leveraging Google and Adobe open…

Security Affairs newsletter Round 233

6 years ago

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs Hi folk, let…

Hacker claims to have stolen over 218M Zynga ‘Words with Friends’ Gamers records

6 years ago

Hackers have stolen more than 218 million records from the popular 'Words With Friends' developed by the mobile social game…

WhiteShadow downloader leverages Microsoft SQL to retrieve multiple malware

6 years ago

Researchers at Proofpoint have spotted a piece of downloader, dubbed WhiteShadow, that leverages Microsoft SQL queries to pull and deliver…

Masad Stealer Malware exfiltrates data via Telegram

6 years ago

Experts at Juniper Threat Labs have discovered a new piece of malware dubbed Masad Stealer that exfiltrates cryptocurrency wallet files…

Nodersok malware delivery campaign relies on advanced techniques

6 years ago

Microsoft researchers observed a campaign delivering malware, dubbed Nodersok, relying on advanced techniques and elusive network infrastructure. Microsoft experts observed…

This website uses cookies.