malware

cuteRansomware leverages Google Docs to avoid detectioncuteRansomware leverages Google Docs to avoid detection

cuteRansomware leverages Google Docs to avoid detection

A newly strain of ransomware dubbed cuteRansomware leverages on a Google Doc to host the decryption key and command-and-control features.…

9 years ago
Hackers used malware to steal $2 million from ATMs in TaiwanHackers used malware to steal $2 million from ATMs in Taiwan

Hackers used malware to steal $2 million from ATMs in Taiwan

Taiwanese law enforcement agencies are investigating malware-based attacks against ATMs of a national bank that resulted in a $2 million…

9 years ago
Experts published IE Exploit code and crooks added it to Neutrino EKExperts published IE Exploit code and crooks added it to Neutrino EK

Experts published IE Exploit code and crooks added it to Neutrino EK

Operators behind the Neutrino EK have added the code to exploit an Internet Explorer flaw that  was recently patched with…

9 years ago
Furtim’s advance capabilities and the Energy SectorFurtim’s advance capabilities and the Energy Sector

Furtim’s advance capabilities and the Energy Sector

The Labs team at SentinelOne recently discovered a sophisticated malware dubbed Furtim specifically targeting at least one European energy company.…

9 years ago
Just 39 USD for a lifetime license for Stampado RansomwareJust 39 USD for a lifetime license for Stampado Ransomware

Just 39 USD for a lifetime license for Stampado Ransomware

The Stampado ransomware is a new threat available for sale on the Dark Web that was discovered by the experts…

9 years ago
How to defeat every ransomware with Crypto DropHow to defeat every ransomware with Crypto Drop

How to defeat every ransomware with Crypto Drop

A group of American boffins have devised a system dubbed Crypto Drop that working with a “save what you can”…

9 years ago
JIGSAW ransomware defeated once again, decrypt your files for freeJIGSAW ransomware defeated once again, decrypt your files for free

JIGSAW ransomware defeated once again, decrypt your files for free

If you are one of the victims of the Jigsaw ransomware there is a good news for you, experts from…

9 years ago
The hidden link between the Angler EK drop and the Lurk gangThe hidden link between the Angler EK drop and the Lurk gang

The hidden link between the Angler EK drop and the Lurk gang

Experts from Talos team have found a link between the drop in the Angler Kit usage and the crackdown against…

9 years ago
Be careful backdoored Pokemon GO Android App spotted in the wildBe careful backdoored Pokemon GO Android App spotted in the wild

Be careful backdoored Pokemon GO Android App spotted in the wild

ProofPoint have found in the wild a backdoored version of the popular Pokemon GO Android App that could allow attackers…

9 years ago
Unmasking malware’s use of TLS without flow decryptionUnmasking malware’s use of TLS without flow decryption

Unmasking malware’s use of TLS without flow decryption

Researchers devised a method to unmask malware's use of TLS without decrypting the data flow. The technique relies on analysis…

9 years ago