malware

Malware experts at ESET released a free tool for ICS Malware analysis

Security experts from ESET that spotted the Industroyer malware used against Ukraine's power grid released a free tool for ICS…

8 years ago

Google experts blocked a new targeted malware family, the Lipizzan spyware

Google has identified a new strain of Android malware, the Lipizzan spyware, that could be used as a powerful surveillance tool.…

8 years ago

Chinese Police dismantled the behind the Fireball adware campaign that infected more than 250 Million PCs

Chinese authorities arrested eleven members of the gang behind the Fireball adware campaign that infected more than 250 Million PCs. Chinese…

8 years ago

CrowdStrike presented the fastest and largest cybersecurity search engine

CrowdStrike Inc., the leader in cloud-delivered endpoint protection, announced the fastest and largest cybersecurity search engine. Security firm CrowdStrike, the…

8 years ago

Fruitfly macOS and OS X backdoor remained undetected for years

A new mysterious strain of macOS and OS X malware dubbed Fruitfly went undetected by malware researchers and security software…

8 years ago

Spring Dragon APT used more than 600 Malware samples in different attacks

The threat actor behind Spring Dragon APT has been developing and updating its wide range of tools throughout the years,…

8 years ago

SLocker decompiled code leaked online for free, a gift for crooks and hackers

The SLocker code leaked online, it is one of the oldest mobile lock screen and file-encrypting ransomware. The code of…

8 years ago

A Russian man involved in the development and maintenance of Citadel was sentenced to five years in prison

The Russian hacker Mark Vartanyan was sentenced to five years in prison for his involvement in the development and maintenance of…

8 years ago

Microsoft sued Fancy Bear to gain control of the domains used in the cyber espionage campaigns

Microsoft used the lawsuit to disrupt a large number of cyber espionage campaigns conducted by infamous Fancy Bear APT hacking…

8 years ago

Modified versions of Nukebot Trojan spotted in wild after code leak

Apparently, different cyber gangs are using modified versions of the Nukebot in wild after code Leak occurred in March 2017. Crooks…

8 years ago

This website uses cookies.