A new DetoxCrypto Ransomware variant called the Nullbyte Ransomware has been discovered by Emsisoft security researched xXToffeeXx that pretends to be the popular Pokemon Go bot application...
When we first encountered Lurk, in 2011, it was a nameless Trojan. It all started when we became aware of a number...
In this blog, FireEye Labs dissects this new ATM malware that we have dubbed RIPPER (due to the project name “ATMRIPPER” identified in...
The Domino Ransomware is a new infection discovered by Daniel Gallagher and Michael Gillespie that is based off of the Hidden Tear open-source ransomware project. What...
With so much attention focused on the file encrypting-type ransomware it’s easy to forget the simpler variety, which pops up when your...
Crooks are always creating new ways to improve the malware they use to target bank accounts, and now Brazilian bad guys have...
Clothing store chain Eddie Bauer said today it has detected and removed malicious software from point-of-sale systems at all of its 350+ stores...
Crooks hijack the FSociety brand for a lame ransomware. Fans of the Mr. Robot TV show would be glad to know that real-life...
The operators of the notorious trojan downloader Nemucod seem to have stepped up their game, serving their victims with ransomware and ad-clickers.
Malicious attachment contains Adwind cross-platform remote access Trojan. Cybercriminals are using clickbait, promising a video showing Democratic Party presidential nominee Hillary Clinton exchanging...
On the morning of Friday August 12th, ESET researchers noticed a huge outbreak of a new Spy.Banker variant, detected as Spy.Banker.ADEA. It...
New free ransomware project appears online. Hooray!!! Serbian security researcher GrujaRS shared with Softpedia a ransomware project called Shark, freely distributed on the...
Short Bytes: A man named Ivan Kwiatkowski managed to install Locky ransomware on the machine of a person who was pretending to...
ESET researchers have spotted fake patch apps for Android – probably the first ever malicious mobile apps masquerading as a patch for...
With the popularity of PokemonGo, it was inevitable that a malware developer would create a ransomware that impersonates it. This is the case...
Proofpoint researchers originally discovered the CryptFIle2 ransomware in March [1]. At the time, it was spreading via exploit kits (EKs); however, beginning...
Redmond races to revoke Secure Boot debug policy. Microsoft leaked the golden keys that unlock Windows-powered tablets, phones and other devices sealed by...
New technique makes malware detection almost impossible. A team of security researchers from Deep Instinct have discovered a method of injecting malware inside...
The trojan downloader Nemucod is back with a new campaign. This time however, it has changed the payload served to its victims...
The trojan downloader Nemucod is back with a new campaign. However, it has changed the payload served to its victims – ransomware...
It looks like file deletion is becoming a standard tactic in new ransomware applications created by less skilled ransomware developers. This is...