malware

Skeleton Key Malware modifies the Active Directory authentication process

Dell SecureWorks detected the Skeleton Key malware, which modifies authentication process on Active Directory (AD) systems protected by only passwords.…

11 years ago

Hackers running Linux Operation Windigo are changing tactics targeting porn sites

Security Experts at ESET firm discovered that Windigo campaign is still active and that bad actors are changing their tactics…

11 years ago

MiniDuke, CosmicDuke and OnionDuke have a same matrix

Security experts collected further evidences of the link between the CosmicDuke, Miniduke and OnioDuke Advanced Persistent Threat campaigns. Researchers at F-Secure…

11 years ago

Financial malware poses as ICS/SCADA Software

Researcher Kyle Wilhoit discovered a spike in traditional financial crimeware targeting ICS/SCADA networks attributing it to attack run by cyber…

11 years ago

Linux DDoS Trojan embeds RootKit component

Security experts at Avast have analyzed a new strain of DDoS trojan targeting Linux operating system dubbed XOR.DDoS which embeds…

11 years ago

Sucuri firm discovered Backdoors relying on the Pastebin Service

The popular copy and paste website Pastebin has been leveraged by hackers to serve a backdoor to millions of users…

11 years ago

New Emotet spam campaign targets German users

Security experts at Microsoft detected a new variant in the Win32/Emotet family which is targeting German users with a new…

11 years ago

Malvertising, HuffingtonPost was serving Malware via AOL Ad-Network

Security company Cyphort has discovered a malvertising campaign that targeted several websites via AOL Ad-Network, including the Huffington Post. Security…

11 years ago

Microsoft observed a significant increase in macros based malware

The Microsoft Malware Protection Center (MMPC) has recently observed a surge in the infections of malware using macros to spread…

11 years ago

Cybercriminals are exploiting the incident of the AirAsia flight QZ8501

Security experts have collected evidence that cyber criminals are exploiting the incident of the flight QZ8501 for illicit activities. Cybercriminals…

11 years ago

This website uses cookies.