The website for Just For Men, a company that sells various products for men as its name implies, was serving malware to...
InfoArmor has identified a special tool used by cybercriminals to distribute malware by packaging it with the most popular torrent files on...
Number of DualToy infections is on the rise. A trojan targeting Windows computers is secretly sideloading mobile applications to any Android or iOS...
Sundown EK fails to improve market share among fellow EKs. The Sundown exploit kit (EK), which has been trying to fill the void...
When we first encountered Lurk, in 2011, it was a nameless Trojan. It all started when we became aware of a number...
The Adwind Remote Access Trojan (RAT) is a popular Java-based backdoor capable of infecting Windows, Linux, Mac OS and Android operating systems....
Malicious attachment contains Adwind cross-platform remote access Trojan. Cybercriminals are using clickbait, promising a video showing Democratic Party presidential nominee Hillary Clinton exchanging...
Corporate cybercrime and information theft has become a very lucrative business for malware developers. Not only does it allow them to steal corporate...
F-Secure researchers say parties involved in the South China Sea arbitration case were infected with the data-stealing NanHaiShu Trojan. Hackers have used...
The crooks behind the recent campaign may be from China. Over 100,000 South Koreans had their banking credentials stolen by crooks who...
Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities from inside....
Two mobile variants of Triada and Horde malware have been spotted in the wild by Check Point Software Technologies researchers who warn the...
One piece of advice that often appears in closed message boards used by Russian cybercriminals is “Don’t work with RU”. This is...
Crooks use brand new potent feature to just show adware. A previously discovered and highly dangerous Android trojan has received an update in...
A Trojan for Android designed to steal user login credentials needed to access online banking programs and to steal money from victims’...
Backdoors are typically designed to execute cybercriminals’ commands on the infected machine. As a rule, they are used to gain a remote...
Today, we’ve been alerted about an ongoing spam campaign against Skype users. The majority of those affected are in India, Japan, and...
Today, we have encountered a new threat that’s a blast from the past. The Petya Trojan (detected by Kaspersky Lab products as...
Compromised websites and spear-phishing emails used to infect targets with Daserf Trojan. A longstanding cyberespionage campaign has been targeting mainly Japanese organizations with...
Short Bytes: Security researchers have identified a new malware named USB Thief that has the ability to steal data from air-gapped computers without leaving...
Built to harvest the banking credentials of victims, the virulent Dridex is now one of the most dangerous pieces of financial malware...