malware

Free Milano Tool scans for Hacking Team Malware and exploits

Researchers at Rook Security have released a free tool, called Milano, that is able to detect the presence of HackingTeam…

11 years ago

Internal emails reveal Hacking Team is working on a weaponized spying drone

Experts who are analyzing the Hacking Team internal emails discovered that the firm is working on the development of a…

11 years ago

New GamaPoS Malware served by the Andromeda Botnet

The experts at Trend Micro discovered GamaPoS, a new PoS malware that is spread through the Andromeda botnet in the…

11 years ago

FBI paid Hacking Team to identify Tor users

Documents leaked online after the Hacking Team data breach revealed that the company supported the FBI in the investigation on…

11 years ago

Law enforcement arrested dozens people from Darkode crime forum

An international joint effort of law enforcement allowed the arrest of dozen people active on the popular Darkode crime forum. A…

11 years ago

Hacking Team Spyware uses a UEFI BIOS Rootkit to gain persistence

Documents leaked online after the Hacking Team hack revealed that the company used a UEFI BIOS rootkit to gain persistence…

11 years ago

Hacking Team will be back to business soon

The Hacking Team CEO David Vincenzetti announced that the popular surveillance company will be back to business vert soon, but…

11 years ago

Seaduke, another weapon in the Duke arsenal

Security researchers at Symantec have analyzed Seaduke, a sophisticated Trojan used by threat actors behind the “Duke” malware family. Security…

11 years ago

Hacking Team, the third Flash Zero-Day is out: CVE-2015-5123

Following the Hacking Team data breach, the security researchers discovered the third Adobe Flash Player zero-day vulnerability. A third Adobe Flash Player…

11 years ago

Hacking Team Another Flash Zero-Day: CVE-2015-5122

Following the Hacking Team data breach, yet another Adobe Flash Player zero-day vulnerability has been found actively exploited in-the-wild. Another…

11 years ago

This website uses cookies.