Undetectable Adwind RAT used in targeted attacks
The malware economy is alive and well! And cyber criminals are making big money by using this business model. The re-emergence of Adwind RAT provides additional proof to support this.Read More →
Data Security News | Infosec Blog | Information Security Tutorials
The malware economy is alive and well! And cyber criminals are making big money by using this business model. The re-emergence of Adwind RAT provides additional proof to support this.Read More →
Popular Android Keyboard App with 50 million downloads is spying on you. A popular Android keyboard app called Flash Keyboard was found by a UK-based cyber-security firm, Pentest to be askingRead More →
It all started from a spam campaign. Figure 1 shows a campaign we picked up recently from our spam traps with a suspicious document file attachment. Notice how poor theRead More →
Threat actors are known to switch targeted geographies from time to time, and it appears that a number have set their sights on Canada within a short time-frame. In theRead More →
When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the trafficRead More →
mraptor is a simple tool designed to detect malicious VBA macros in MS Office files, based on characteristics of the VBA code. This article explains how it works, and howRead More →
On June 29th, Cheetah Mobile Security Research Lab issued warnings against a newly found mobile phone trojan family, which has been dubbed “Hummer.” During the first half of 2016, theRead More →
Lizard Squad’s tool becomes very popular thanks to the millions of unsecured IoT devices ready for the taking. Security experts from Arbor Networks have uncovered over 100 botnets that areRead More →
IN THE PAST two years a group of researchers in Israel has become highly adept at stealing data from air-gapped computers—those machines prized by hackers that, for security reasons, areRead More →
We recently noticed Retefe campaigns targeting UK banking customers. Using fake certificates, the Trojan is designed to trick victims into giving up their login credentials and other sensitive information. AtRead More →