malware

Cybaz-Yoroi ZLAB shed the light on Op. ‘Pistacchietto’: An Italian Job

In the past weeks, a new strange campaign emerged in the cyber threat Italian landscape, it has been tracked as…

7 years ago

Experts collect more evidence that link Op ‘Sharpshooter’ to North Korea

Security researchers at McAfee have linked the Op. Sharpshooter with the North Korea-linked Lazarus APT group after analyzing code from…

7 years ago

Necurs Botnet adopts a new strategy to evade detection

The Necurs Botnet continues to evolve, a new strategy aims at hiding in the shadows, and leverages new payloads to…

7 years ago

Threat actors using FrameworkPOS malware in POS attacks

Security experts at Morphisec observed a wave of attacks against point-of-sale (PoS) thin clients using card data scraping malware and…

7 years ago

[SI-LAB] FlawedAmmyy Leveraging Undetected XLM Macros as an Infection Vehicle

SI-LAB captured a piece of the FlawedAmmyy malware that leverages undetected XLM macros as an Infection Vehicle to compromise user’s…

7 years ago

Emissary Panda updated its weapons for attacks in the past 2 years

Experts analyzed tools and intrusion methods used by theChina-linked cyber-espionage group Emissary Panda in attacks over the past 2 years.…

7 years ago

Ransomware, Trojan and Miner together against “PIK-Group”

Security expert Marco Ramilli analyzed a new piece of malware apparently designed to target PIK-Group that implements ransomware, Trojan, and…

7 years ago

Multiple threat actors are targeting Elasticsearch Clusters

Security researchers at Cisco Talos are warning of a spike in attacks on unsecured Elasticsearch clusters to drop cryptocurrency miners.…

7 years ago

The Arsenal Behind the Australian Parliament Hack

Cybaze-Yoroi ZLab investigated artefacts behind Australian Parliament attack to have an insight of Tools and Capabilities associated with the attackers.…

7 years ago

Malware spam campaign exploits WinRAR flaw to deliver Backdoor

Experts discovered a malspam campaign that is distributing a malicious RAR archive that could exploit the WinRAR flaw to install…

7 years ago

This website uses cookies.