When a site gets hacked, the attack doesn’t end with the malicious payload or spam content. Hackers know that most website administrators...
Verint’s Cyber Research team has discovered an unknown variant of the Nymaim malware family, a group of threats that are also capable...
Although Locky sounds like fun, it actually denotes one of the today’s prevalent ransomware families. Discovered in mid-February 2016, this file-encrypting epidemic...
Security researchers discovers IRCTelnet malware. A new malware family written by what appears to be an experienced coder is aiming for Linux-based...
IT security professionals appear to be in a constant run after numerous ransomware authors who systematically infect individual computers as well enterprise...
We recently published an overview blog about the CloudFanta malware campaign that uses the Sugarsync cloud storage app to deliver malware capable...
Recently, our analyst Jérôme Segura captured an interesting payload in the wild. It turned out to be a new bot, that, at...
‘Moonlight’ group is likely to be involved in cyberespionage, warns Vectra Networks. A hacking group is conducting cyberespionage against targets in the...
Beware of not so old yet widespread Microsoft Security Essentials Scam that tells users to call a support number that instructs users to...
Short Bytes: Check Point has released the list of the most dangerous malware that are most prevalent in the world. This list was topped by...
Trojan targets desktops, not servers or IoT devices. Malware authors are taking aim at Linux computers, more precisely desktops and not servers, with...
The click me game malware is developed by Iranian hacker as its readme file is written in Persian. Karsten Hahn, a malware...
Yesterday, GData malware analyst Karsten Hahn discovered an in-development ransomware disguised as a click me game. When executed the ransomware will launch a screen that...
“Common sense” is an oft-prescribed remedy for email-based malware threats: Don’t click on unknown links, don’t enable macros in documents from unknown...
“Side channel” in Haswell CPUs lets researchers bypass protection known as ASLR. Researchers have devised a technique that bypasses a key security protection...
Malware hides credit card data inside image files. Hackers are collecting payment card data from Magento stores, hiding the stolen data inside...
NRSC hack – A platform used by the National Republican Senatorial Committee for the donations was hacked and donors’ financial data have...
Who needs complicated malware when you have dynamite.Criminals like to use explosives to break into ATMs, rather than deploy malware, a recent...
Your Selfie can Land You In Great Trouble — Researchers Discover New Malware that Asks for User’s Selfie to Carry Out Identity...
Forget ATM malware, criminals are using explosive to crack ATM machines and steal thousands of Euros in Europian countries. It is definitely...
Android Smartphones from Foxconn Manufacturer Plagued with Dangerous Security Flaw known as Pork Explosion. Android operating system has become quite vulnerable to...