malware

New private Exploit-Kit “Infinity” available on the underground

Security Experts at Intercrawler have discovered in the underground a new Exploit-Kit dubbed "Infinity" which might be a new replacement…

12 years ago

Ajax Security Team lead Iran-based hacking groups

FireEye published a report titled "Operation Saffron Rose" to document the activities of the Iranian hacking group named Ajax Security…

12 years ago

Hackers have stolen files on Ukraine crisis from Belgian Foreign Ministry

Unknown hackers have stolen files on the Ukraine crisis from the Belgian Foreign Ministry, causing the crackdown of targeted servers.…

12 years ago

Check Point Security Report 2014 – Malware in the enterprise

Check Point 2014 Security Report shows major security events occurred in 2013 show and provides useful information on current malware…

12 years ago

Shiqiang APT cyber espionage using RAT signed with stolen certificates

Security experts at McAfee Labs have discovered a new cyber espionage based on the malware digitally signed with stolel certificates.…

12 years ago

Steganography to hide secret messages in user’s tweets

Discover how it is possible to apply steganography to hide secret messages in common tweets (or any text) with steg.js-of-the-dump.…

12 years ago

RedSocks, An interesting vision on Malware trend in Q1

Dutch malware detection company RedSocks has issued its first Malware Trend Report related to the malicious code trends observed in…

12 years ago

Using lnk file to deceive users in phishing attacks

Expert at Trustwave explained the tactics adopted by cyber criminals how to serve malware in phishing attacks exploiting  .lnk files.…

12 years ago

Skype stores all application data in a local database in plain text

Romanian Researcher discovered that Skype application store sensitive User Data Unencrypted on a local database. A Romanian programmer at Hackyard Security Group, Dragoş Gaftoneanu,…

12 years ago

How to hide a backdoor using PHP Callback Functions

Securi firm has published an interesting post to explain how malware authors could hide a backdoor using PHP Callback functions.…

12 years ago

This website uses cookies.