Home Malware

Malware

MacOS malware drains victims’ pockets by mimicking banking websites

Since being discovered, OSX/Dok malware has been growing fast. The latest version of the malware enabled attackers to obtain victim’s financial credentials by imitating...

Gandi is under attack, hundreds of domain addresses hijacked

Gandi, a domain name registrar and cloud hosting company, admitted over 750 web addresses stolen. On July 7, an unidentified attacker obtained the company’s login,...

Adwind on the rise, spreading malware through spam emails

A recent research shows that Adwind is back. The cross-platform Remote Access Trojan is known by multiple names, including AlienSpy, jFrutas, Frutas, Unrecom, JSocket, Sockrat,...

Wikileaks revealed BothanSpy & Gyrfalcon, alleged CIA’s SSH credential thieves

On Thursday, July 6, Wikileaks released documents on two projects, BothanSpy and Gyrfalcon, linking both to the CIA. The batch, named BothanSpy after the...

NotPetya’s creators prove they can unscramble a file

Journalists of Motherboard have contacted the hackers linked to the new variety of Petya, often referred to as NotPetya. An encrypted file sent to...

Experts neutralized another malware attack in Ukraine

In cooperation with the Security Service of Ukraine (SBU), Ukrainian cyber police have stopped the second wave of Petya cyber-attack. Arsen Avakov, Interior Minister of...

British teen charged with organizing DDoS attack business

Jack Chappell, an 18-year-old student from Stockport, West Midlands, has been charged with providing DoS software to cybercriminals attacking world’s largest businesses. He appeared...

WordPress Statistics hit by SQL Injection vulnerability

During their vulnerability research project, experts at Sucuri Inc. have detected a SQL injection flaw in WP Statistics. The WordPress Statistics plugin enables administrators...

OutlawCountry: an alleged CIA’s Linux malware

On Thursday, June 29, Wikileaks revealed documentation, the user manual and test plan, related to the OutlawCoutry project. The whistleblower website attributes the malware...

EMET-like capabilities will be embedded in Windows 10

Developers will include Windows Defender Exploit Guard into The Windows 10 Fall Creators Update. The brand-new feature may also come with EMET-like features. The Enhanced...

TRENDING STORIES

FOLLOW US

77FansLike
16FollowersFollow