Old Android Ransomware Hits with New Attack Vector
A newly-found Android attack method for ransomware has been revealed in the form of an almost silent exploit kit. It […]
Old Android Ransomware Hits with New Attack Vector Read More »
A newly-found Android attack method for ransomware has been revealed in the form of an almost silent exploit kit. It […]
Old Android Ransomware Hits with New Attack Vector Read More »
Recently, a security researcher has discovered a feature in Regsvr32 which allows a hacker to bypass application whitelisting protections, such
Regsvr32 Hack Bypasses Windows AppLocker Protection Read More »
It has been discovered that Nemucod ransomware uses the free open source archive software 7-Zip to encrypt files. Nemucod is
Variant of Nemucod Ransomware Encrypts Files Using 7-Zip Software Read More »
Thanatos is a new trojan which was discoved on March 6, this year, by the security firm Proofpoint. Thanatos (personification
New Trojan Wipes Competing Malware from the Infected Computer Read More »
A recent study shows that exploit kit writers turn away from Java and focus their full attention on Adobe Flash.
Exploit Kit Creators Focus Entirely on Adobe Flash Read More »
University researchers report that the tech giant Google found 760,935 compromised websites across the web during a year-long research. The
Google Found Over 760,000 Compromised Websites in a Year Read More »
The Check Point security researches reported a change in the Kovter malware’s mode of operation, which has slowly morphed into
Kovter Click-Fraud Shifts to Ransomware Read More »
According to a study made by Carbon Black, Microsoft’s PowerShell task automation framework is getting more and more popular tool
PowerShell Becomes A Prevalent Technology In Malware Creation Read More »
Nowadays, the hackers attacking financial systems are much smarter and better organized than before, thus they’re stealing huge amounts of
Hackers Attack Invoicing, Payroll and Superannuation Systems: AFP Read More »
A massive malvertising campaign in Netherlands is currently infecting some of the most popular Dutch websites. By now, the campaign
Massive Malvertising Campaign Attacks 288 Websites Read More »
Recently, Palo Alto Networks, known as one of the leaders in enterprise security, reported that cyber criminals in Nigeria have
New Source Of Cyberthreats Attacks Businesses Read More »
Cisco’s Talos Security Intelligence together with Research Group has released a new report on the next phase of ransomware. According
Cryptoworms: The Future of Ransomware? Read More »
Nowadays, Crypto ransomware is considered as one of the biggest threats to enterprises, especially when it comes to phishing email
Malware Cocktail Used in Email Phishing Scams Read More »
Rokku ransomware was discovered a few weeks ago. One of the most common methods for distributing it is via spam
Rokku Ransomware Linked To Chimera Read More »
A brand new ransomware has just appeared. It not only encrypts your files, but also deletes them in case it
Jigsaw Ransomware Deletes Your Files Unless You Are Fast Enough Read More »