The website of popular American brand Maisto, known for miniature and radio-controlled toy vehicles, was caught pushing the Angler exploit kit eventually leading to ransomware...
Microsoft Windows has hidden an Easter Egg since Windows Vista. It allows users to create a specially named folder that acts as...
A group cyber criminals created Ran$umBin, A Dark web service which operates the one-stop shop for monetizing ransomware. These days Ransomware are...
Last week Kafeine posted an analysis of a new ransomware called CryptXXX on the Proofpoint blog. Based on their analysis they determined that...
A security researcher named Mosh has discovered a new variant of the 7ev3n Ransomware, which has rebranded itself as 7ev3n-HONE$T. This ransomware will encrypt your...
The authors of the TeslaCrypt ransomware have improved it by implementing new sophisticated evasion techniques and targeting new file types. The authors...
Compromised websites remain one of the surefire ways to redirect innocent visitors to exploit kits. During the past few days we’ve started seeing...
In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been...
Google warns that surfing on Google.com is dangerous, here is why!. The world’s top website is partially dangerous for Internet users. We are...
The Ware Report’s recommendations still important as proven by ransomware and breaches. The National Security Archives at George Washington University has just added...
A new ransomware was discovered that tries to impersonate the well known Locky ransomware. It calls itself Locky and even adds .Locky to...
Security researcher finds malicious code embedded within cameras offered for sale on Amazon. Last week, independent security researcher Mike Olsen discovered that CCTV...
Adware installers are out of control and with little or no law regulating them, the crap they push onto their victims is...
Rokku is yet another ransomware, discovered in recent weeks. Currently, it’s most common distribution method is spam where a malicious executable is dropped...
Beware, even things on Amazon come with embedded malware… this is the disconcerting discovery made by the expert Mark Olsen. The security expert Mike...
Crypto-ransomware has turned every network intrusion into a potential payday. There’s something inherently world-changing about the latest round of crypto-ransomware that has been...
XOR botnet authors migrate to using BillGates malware. Over the past six months, security researchers from Akamai’s SIRT team have observed a shift...
A threat actor named TA530 group, has been targeting executives in an attempt to infect their machine with various malware, including ransomware....
Security experts warn companies need to brace for new harder-to-detect and more determined variants of the Locky ransomware spotted recently in the...
ShortBytes: In a recent find out, it has been revealed how NSA implants trojan firmware in the networking devices being delivered to...
The FBI issued a confidential urgent “Flash” message to the businesses and organizations about the Samsam Ransomware, why it is so dangerous?...