remote access trojan

MACSPY – Remote Access Trojan as a service on Dark web

Reporters for the online service "Bleeping Computer" have uncovered a new threat to Apple being offered on the dark web,…

7 years ago

Asian Nation-State hackers use fileless RAT for their hacking campaign

State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security…

8 years ago

How to use a malicious JPEG to hack corporate networks

Security researcher Marcus Murray discovered a method to exploit a malicious JPEG to compromise modern Windows servers inside corporate networks.…

9 years ago

Security Companies united against the Hidden Lynx APT and its weapons

Principal security firms united in a joint effort dubbed Operation SMN against the cyber espionage group known as Hidden Lynx…

10 years ago

Microsoft Seized No-IP Domains, Millions dynamic DNS users affected

Executing an order of a Nevada Court, Microsoft has seized domains belonging to the No-IP.com Dynamic DNS Service affecting the…

10 years ago

Poison Ivy still alive, old malware new cyber threats – FireEye report

Security vendor FireEye has published a detailed analysis on the popular Poison Ivy RAT, releasing also a set of tools…

11 years ago

This website uses cookies.