Researchers Put Together PHP Zero-Day in Order to Hack PornHub
PHP project fixes issues affecting all PHP versions 5.3+ A team of three researchers went so far as to search and discover a PHP zero-day so they could hack PornHub asRead More →
Malware News | Infosec Blog | Information Security Tutorials
PHP project fixes issues affecting all PHP versions 5.3+ A team of three researchers went so far as to search and discover a PHP zero-day so they could hack PornHub asRead More →
Adwind author still has a lot of work ahead of him. Security researchers have observed an instance of the Adwind RAT dropping a Mac payload for the first time, but despiteRead More →
Far too many otherwise intelligent and talented software developers these days apparently think they can get away with writing, selling and supporting malicious software and then couching their commerce asRead More →
The crooks behind the recent campaign may be from China. Over 100,000 South Koreans had their banking credentials stolen by crooks who leveraged the BlackMoon banking trojan, also detected asRead More →
A new ransomware has been discovered by AVG malware analyst @JakubKroustek called HolyCrypt. This ransomware is written in Python and compiled into a Windows executable using PyInstaller. This allows the developer to distributeRead More →
A decryptor has been released by ransomware expert BloodDolly that will allow victim’s encrypted by the ODCODC Ransomware to recover their files for free. Though the Command & Control serversRead More →
Dell SonicWall equipment came with a hidden account. Security researchers have discovered six serious security issues that plague several Dell SonicWall products, one of which is a hidden account with easy-to-guessRead More →
Australia is being hit hard by ransomware attacks and we’ve heard a lot of security vendors advise against paying the ransom that cybercriminals demand to decrypt locked files. But RSARead More →
Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities from inside. Delilah is a strain of malware developed toRead More →
In part one of our web shell series we analyzed recent trends, code bases, and explored defensive mitigations. In part two we investigate a new web shell created by Chinese-speakingRead More →