This past Saturday security researchers Kafeine, MalwareHunterteam, BroadAnalysis, and David Martínez discovered a new ransomware being distributed through EITest into the RIG exploit kit. As this ransomware was...
A new adware family named Crusader will rewrite tech support phone numbers returned in Google search results, display ads, and show popups...
Malicious Apps hosted in Google play store is a never ending process, researchers from Zsclarer and ESET reported dozens of the app...
Security researchers at MalwareBytes have uncovered a spearphishing campaign that targeted Saudi Arabia Government organizations. Security experts at MalwareBytes have spotted a...
Mac OS X is still secure 16 years after its creation, but increasingly being targeted by cybercriminals. No operating system is 100%...
After last month security researchers discovered the first-ever Word document spreading macro malware on macOS, last week, researchers from Fortinet spotted a...
Security researchers from Malwarebytes have discovered a new malvertising campaign targeting visitors of several adult websites, spreading the Ramnit trojan and focusing...
The vast majority of malware incidents that take place at industrial facilities around the world are just accidental infections, albeit a very...
Malware authors in China are using fake base transceiver stations (BTSs), which is equipment usually installed on cellular telephone towers, to send...
A new ransomware was discovered today by MalwareHunterTeam called LLTP Ransomware or LLTP Locker that is targeting Spanish speaking victims. On a closer look, this...
A malware author that loves Polish hip hop music appears to be behind the Polski, Vortex, and Flotera (spelled Ŧl๏tєгค) ransomware families...
PUP(potentially unwanted program) packages that install’s along with Chinese software’s consist of backdoors targeting English speakers. The backdoor was uncovered by Malware...
A driver secretly installed via PUPs packages for Chinese software contain backdoors enabling a third-party to load unsigned drivers or to execute...
In 2014, ESET delivered a comprehensive and detailed report on Operation Windigo. We take a look back at what was documented and...
We are seeing a wave of new NSIS installers used in ransomware campaigns. These new installers pack significant updates, indicating a collective...
A new group of POS malware family made its presence targeting business systems around North America and Canada.The objective of PoS malware...
Trend Micro has discovered a new PoS malware, tracked as MajikPOS, that is targeting business in North America and Canada. Security experts...
A new CryptoMix, or CryptFile2, variant called Revenge has been discovered by Broad Analysis that is being distributed via the RIG exploit kit. This...
Previously unknown ransomware technique. This year we found a new family of ransomware used in targeted attacks against organizations. After penetrating an...
A scientist’s Team from Graz University of Technology revealed the method that leaking the encryption data from Intel SGX (Software Guard Extensions...
Hancitor has grown into the main five of the ‘most wanted’ malware families worldwide for the first time, reported by Checkpoint Threat Intelligence...