malware

JIGSAW ransomware slowly deletes your files as you shilly-shally to pay the ransom

A new threat is appeared in the wild it is the JIGSAW ransomware that slowly deletes your files as you…

10 years ago

Asian Nation-State hackers use fileless RAT for their hacking campaign

State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security…

10 years ago

Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015

According to a research conducted by IBM the healthcare industry was a privileged target of cybercriminals last year, more than…

10 years ago

RansomWhere, the free ransomware detection tool for Mac OS X

The former NSA expert Patrick Wardle has designed RansomWhere, a free ransomware detection tool for the protection of Mac OS…

10 years ago

A new strain of Teslacrypt implements sophisticated evasion

The authors of the TeslaCrypt ransomware have improved it by implementing new sophisticated evasion techniques and targeting new file types.…

10 years ago

Google is a ‘Partially Dangerous’ Website … According to Google

According to Google, Google is a ‘partially dangerous’ website because some pages on google.com contain deceptive content. According to Google’s…

10 years ago

Multigrain PoS malware exfiltrates stolen card data over DNS

FireEye has discovered a new strain of POS malware dubbed Multigrain that steals card data from point-of-sale systems and exfiltrates…

10 years ago

American company lost $100 million to BEC fraud

US prosecutors confirmed on Thursday that an American firm lost nearly $100 million in a BEC (business email compromise) scam.…

10 years ago

GozNym Trojan combines Gozi ISFB and Nymaim malware abilities

The security experts from the  IBM X-Force Research spotted a new threat dubbed GozNym Trojan that combines Gozi ISFB and…

10 years ago

The Qbot malware is back with new evasion techniques

Experts at BAE Systems revealed that the Qbot malware is back with new evasion techniques and very effective polymorphic capabilities.…

10 years ago

This website uses cookies.