malware

Gh0st RAT used in targeted attacks against Tibetan activists

APT actors trying to use the G20 2014 summit as a lure to compromise Tibetan nongovernmental organizations (NGOs) with Gh0st…

11 years ago

The millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystems

Trend Micro issued a research paper on operations behind Predator Pain and Limitless keyloggers, both of which are easily obtainable…

11 years ago

Masque Attack – every iOS app could be compromised

Researchers at FireEye identified a new attack dubbed the Masque, which allows attackers to replace a genuine app with a…

11 years ago

Happy BirthDay Security Affairs – three years together!

Happy BirthDay Security Affairs! Three years together, it all began the 11/11/2011, a dream that becomes more and more real…

11 years ago

WireLurker malware is threatening Apple mobile devices

Security Experts at Palo Alto Networks have discovered a new variant of malware dubbed WireLurker that is infecting Apple mobile…

11 years ago

Amazon phishing campaign aim to infect Holiday shoppers

Security experts at AppRiver firm uncovered Malicious Amazon phishing emails that aim to infect Holiday Shoppers in the U.S. and…

11 years ago

Russian hackers infiltrated many US critical infrastructure

The Department of Homeland Security (DHS) revealed that Russian hackers have infiltrated several critical infrastructure in the United States. Government…

11 years ago

Facebook scams – Top 5 categories identified by a 2-year study

A two-year study conducted by researchers at Bitdefender analyzed more than 850000 Facebook scams identifying the most popular frauds. Experts…

11 years ago

ROM is the new improved strain of the Backoff PoS Malware

Security experts at Fortinet detected a new variant of Backoff malicious code dubbed ROM, which is an improved version of…

11 years ago

Bad actors are using Gmail Drafts to control their bots

Security company Shape Security discovered a new strain of malware which is exploiting Gmail service as a communication channel with…

11 years ago

This website uses cookies.