malware

How to recover files encrypted by all Teslacrypt Ransomware variants

Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted by all the…

10 years ago

Bolek Banking Trojan, a Carberp Successor is spreading in the wild

The Bolek banking Trojan is one of the successors of the notorious Carberp Trojan that targets both 32-bit and 64-bit…

10 years ago

Necurs Botnet, one of the world’s largest malicious architecture has vanished

The Necurs Botnet, one of the world's largest malicious architecture, used to spread the dreaded threats appears to have vanished…

10 years ago

CRYPTXXX campaigns, threat actors switch to Neutrino EK

Security experts from the SANS observed that new CryptXXX ransomware campaigns are leveraging on the Neutrino Exploit Kit instead the…

10 years ago

32 Million Twitter account credentials offered for sale

A hacker is offering for sale more than 32 million Twitter account credentials with plans to sell the account details…

10 years ago

Companies Are Stockpiling Bitcoin To Quickly Pay Off Ransomware Criminals

New research conducted by Citrix indicates that some businesses are stockpiling Bitcoins so they can pay cybercriminals fast in case…

10 years ago

Charging Mobile Devices could be very risky according to Kaspersky

Experts from Kaspersky Lab have conducted an experiment to demonstrate the risks for charging mobile devices with untrusted USB charging…

10 years ago

As of the end of March, 93 percent of all phishing emails contained ransomware

The anti-phishing company PhishMe that observed that as of the end of March 93 percent of all phishing emails contained…

10 years ago

FastPOS PoS malware implements a quick exfiltration method

Trend Micro experts discovered a new strain of Point-of-Sale (PoS) malware dubbed FastPOS that implements a quick and efficient exfiltration…

10 years ago

Ransomware campaigns … how to net $90,000 per year

Experts at Flashpoint published an interesting analysis of a ransomware campaign organized by a small gang of cyber criminals. Cybercrime…

10 years ago

This website uses cookies.