malware

TROJ_POSHCODER A ransomware uses Windows PowerShell features

Malware analysts at Trendmicro have discovered a new Ransomware malware using feature of Windows PowerShell which targeted English language users.…

10 years ago

Soraya PoS Malware, a new start in criminal ecosystem

Security experts at Arbor Networks have discovered a new type of PoS malware called Soraya that implements memory scraping and…

10 years ago

A new way to bypass Secure Boot security mechanism of UEFI

Security Experts discovered a new attack method to defeat Secure Boot security mechanism of the UEFI (Unified Extensible Firmware Interface).…

10 years ago

AV alone is not enough to protect PC from zero-day malware

A recent research conducted by experts at Lastline Labs have demonstrated that AV alone is not enough to protect computers…

10 years ago

Russia and Ukraine cyber dispute analyzed by FireEye

FireEye has issued data which show the intensification of activities in the cyberspace correspondent  to geopolitical tension between Russia and Ukraine.…

10 years ago

Iranian hackers behind most elaborate spying campaign on social media

Experts at iSight issued a report describing the most elaborate net-based spying campaign organized by Iranian hackers using social media.…

10 years ago

Fake Android WeChat app used to spread banking trojan in China

Security experts at Kaspersky Lab have discovered a new banking trojan, dubbed Banker.AndroidOS.Basti.a, hidden in a fake WeChat application. Cyber…

10 years ago

Unrecom phishing campaign hit high-profile entities globally

Security Experts at Fidelis Cyber Security firm have recently discovered a new phishing campaign using the Unrecom RAT (remote access…

10 years ago

Sophisticated Google Drive Phishing Scam is becoming popular

Security experts at Symantec have discovered a new phishing scheme based on Google Drive that is being used by hackers…

10 years ago

FBI is officially looking for malware development

The FBI (Federal Bureau of Investigation) has issued a solicitation for malware development confirming the use of malicious code for…

10 years ago

This website uses cookies.