The Cyberkov Security Incident Response team spotted a cyber espionage campaign in Lybia conducted by a group named Libyan Scorpions.…
InfoArmor has discovered the RAUM tool in criminal forums, it is a special tool to distribute malware by packaging it…
The new variant of the popular iSpy keylogger (version 3.x) was available in the criminal underground with sophisticated features. Security…
Security firm Certego has been detecting multiple viral spam campaigns leveraging a new malware evasion technique it called BadEpilogue. Starting…
Security experts from the cyber threat intelligence firm Blueliv have published a report on the banking Trojan Vawtrak v2 its…
Two security researchers have developed an undetectable PLC rootkit that will present at the upcoming Black Hat Europe 2016. The…
Surveillance is a profitable business, Motherboard has published a never-before-seen 10-minute video showing a live demo of a surveillance software.…
Experts from Sophos discovered Mal/Miner-C, a malware designed to abuse resources of the infected machine to mine Monero (XMR) cryptocurrency.…
The researcher MalwareMustDie discovered LuaBot, a trojan completely coded in Lua language that is targeting Linux platforms to recruit them…
Experts from Dr Web discovered a new Linux Trojan called Linux.BackDoor.Irc.16 that is written in the Rust programming language. It…
This website uses cookies.