Symantec

Dragonfly 2.0: the sophisticated attack group is back with destructive purposes

While the first Dragonfly campaigns appear to have been a more reconnaissance phase, the Dragonfly 2.0 campaign seems to have destructive…

7 years ago

Critical vulnerabilities open Symantec customers to remote hack

Symantec has fixed dozens of critical vulnerabilities affecting its solutions that can be exploited by remote attackers for arbitrary code…

9 years ago

Duuzer, a data stealer Trojan targets South Korean organizations

Researchers at Symantec uncovered bad actors that have been using a backdoor Trojan dubbed Duuzer to target organizations in South…

9 years ago

The mystery behind the Internet-of-Things vigilante malware

A new strain of malware identified by Symantec as the Vigilante malware, aka Wifatch, has infected tens of thousands of…

9 years ago

Symantec discovered 49 New Modules of the Regin espionage platform

Symantec revealed the existence of 49 new modules of the Regin espionage platform, a circumstance that suggests that its operators…

9 years ago

Password Recovery Scam – how to hack a Gmail account

Security experts at Symantec are warning about a new password recovery scam targeting Gmail users worldwide mainly for intelligence gathering.…

10 years ago

Frustrating Revelations about Zero-Day Threats and Their Lack of Detection for 2 Whole Months

The recent report from ISTR has outlined the fact that zero-day vulnerabilities remain unresolved for 59 days. What you can…

10 years ago

Financial Trojans in 2014 – Symantec reports a significant drop in infections

Symantec revealed observed a significant drop in the number of  Financial Trojans in 2014, a report includes a detailed analysis…

10 years ago

The Europol and security giants dismantled the Ramnit botnet

The Ramnit botnet has been shut down in a joint effort by the Europol and the security firms Symantec, Microsoft,…

10 years ago

How attackers use phishing kits for their campaigns

How cyber criminals use several phishing kits to run malicious campaigns and which is the economy behind this category of…

10 years ago

This website uses cookies.