Late last week saw the appearance of a new ransomware called GandCrab. Surprisingly, it is distributed via two exploit kits: RIG EK...
One of the major concerns for the US economy is to deal with Cyber security. The critical infrastructure like the energy system,...
Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. Yeti...
The Police are supposed to protect and serve but Taiwanese police in the news for distributing malware-infected USB sticks to the winners of a cybersecurity-related quiz during...
Assemblyline is a scalable distributed file analysis framework. It is designed to process millions of files per day but can also be installed...
Scannerl is a modular distributed fingerprinting engine implemented by Kudelski Security. Scannerl can fingerprint thousands of targets on a single host, but can...
[jpshare]Ransomware JAFF Back in action this late April, circulating through malicious PDF files.Necurs, one of the biggest botnets, went disconnected amid the...
A new ransomware called Mole was found by security researcher Brad Duncan while he was analyzing a new SPAM campaign. After examining this sample, I feel...
This article sheds light on the current ecosystem of the Sathurbot backdoor trojan, in particular exposing its use of torrents as a...
A new CryptoMix, or CryptFile2, variant called Revenge has been discovered by Broad Analysis that is being distributed via the RIG exploit kit. This...
Facebook is one of the most used social media platforms in the world, and that makes it an attractive target for cyber...
A security researcher named slipstream/RoL has discovered the Karma Ransomware, which pretends to be a Windows optimization program called Windows-TuneUp. What is worse is...
Akamai Technologies, Inc. (NASDAQ: AKAM), the global leader in content delivery network (CDN) services, today released its Second Quarter, 2016 State of...
A new ransomware called Alma Locker has been discovered by Proofpoint researcher Darien Huss that encrypts a victim’s data and then demands a ransom of 1...
Numbers so random no one can predict how random they’ll be. The Tor project has cooked up a new way to generate random...