malware

Funny? Useful? Cool? Kali Linux natively on Windows 10

It's funny, but it is true, the popular Kali Linux hacking distro is available for download on the official Microsoft…

8 years ago

ComboJack Malware alters Windows clipboards to steal cryptocurrencies and payments

Palo Alto Networks discovered a malware dubbed ComboJack that is able of detecting when users copy a cryptocurrency address and…

8 years ago

Over 40 models of low-cost Android devices shipped with Triada banking Trojan

Security researchers at Dr.Web have discovered over 40 models of low-cost Android smartphones are shipped with the dreaded Android Triada banking…

8 years ago

CannibalRAT, a RAT entirely written in Python observed in targeted attacks

Security researchers from Cisco Talos discovered a new remote access Trojan (RAT) dubbed CannibalRAT that has been written entirely in Python.…

8 years ago

Hundreds of Tim Hortons outlets across Canada closed after malware attack

Tim Hortons restaurants across Canada have been hit by a computer malware that forced some locations to shut down over…

8 years ago

Victims of the GandCrab ransomware can decrypt their files for free using the decryptor

The GandCrab ransomware decryptor has been released by the Romanian Police (IGPR) under the supervision of the General Prosecutor’s Office…

8 years ago

DPA Report: Russia-linked APT28 group hacked Germany’s government network

Germany Government confirmed that hackers had breached its computer network and implanted a malware that was undetected for one year.…

8 years ago

Hundreds of sites based on WordPress, Joomla and CodeIgniter infected by ionCube Malware

Security researchers at the firm SiteLock have discovered that hundreds of websites have been infected with the ionCube malware. Security…

8 years ago

With Android P Google Plans To Prevent Cellphone Spying Through Your Camera and Microphone

Android P, is expected to include a neat feature that prevents apps running in the background from spying on you…

8 years ago

Counterfeit Code-Signing certificates even more popular, but still too expensive

Code-signing certificates are precious commodities in the criminal underground, they are used by vxers to sign malware code to evade detection.…

8 years ago

This website uses cookies.