The latest variant of CryptoWall 4.0, one of the most popular and dangerous ransomware threats, has been recently added to the infamous Angler Exploit Kit. In my 2016 Cyber Security Predictions, I have predicted the criminal practices of the extortion will reach levels never seen before. Cyber criminals will threaten victims with ransomware and DDoS attack in […]
Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have uncovered a new remote access Trojan (RAT) named Trochilus that is able to evade sandbox analysis. The Trochilus malware was used to targeted attacks in multi-pronged cyber espionage operations. Experts at Arbor Networks uncovered a cyber […]
Facebook users are receiving malicious email delivering malware masquerading as audio message, a similar campaign also targeted WhatsApp users. Social media and instant messaging application are a privileged vector for cyber threats, in many cases bad actors exploited them to spread malicious links and infect a large number of users. Now a new campaign is targeting […]
Asacub is a new Android threat that has been used by bad actors to infect thousands of users in Russia in a recent SMS spam campaign. According to the experts from Kaspersky Lab, the Trojan-Banker.AndroidOS.Asacub was first detected as a new spyware Trojan. The experts noticed that one of the C&C servers used by the Asacub Android malware (chugumshimusona[.]com) was also […]
Dr Web discovered a new Malware dubbed Linux.Ekoms.1 designed to target Linux systems and takes screenshots every 30 seconds. Security experts at antivirus company Dr. Web have discovered a new Trojan dubbed Linux.Ekoms.1 designed to target Linux systems. The malware could be used to spy on the victims, it takes screenshots every 30 seconds and saves them […]
A collection of interesting info about the Stuxnet attack published years ago by The New York Times, a must-read for experts. The popular cyber security expert Mikko Hypponen has retwitted an old blog post on the Stuxnet malware, a good opportunity to summarize the events and understand what is happened behind the scene. In 2011, The […]
The Las Vegas Casino firm Affinity Gaming sued Trustwave for allegedly failing a data breach investigation, but Trustwave denies any wrongdoing. Affinity Gaming, a casino operator operating five casinos in Nevada, and six in other locations in the US, has sued the It security company Trustwave for a “bad” investigation, after a network breach it […]
A study conducted by TripWire over the past year revealed successful cyber attacks on the energy industry increased as never before. US oil and gas companies are under attack, over 80% of them have reported a significant increase in the number of cyber attacks. According to Tripwire, over the past year successful cyber attacks have increased […]
Once again, the security expert Patrick Wardle has demonstrated how to bypass the Apple Gatekeeper security feature. Once again, a security expert demonstrated how to bypass OS X’s Gatekeeper security feature, and the worst news is that the patch distributed by Apple fixes the problem only temporarily. Apple tried to mitigate the attack method (CVE-2015-7024) with the […]
The operators behind the MegalodonHTTP botnet have been arrested in an international joint effort of law enforcement and a private security firm. In December, Norway law enforcement arrested five people accused of running the MegalodonHTTP Remote Access Trojan (RAT) as part of a joint operation between Norway’s Kripos National Criminal Investigation Service and Europol, codenamed “OP […]