Delilah, the first Trojan to recruit Insiders
Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities from inside. Delilah is a strain of malware developed toRead More →
Malware News | Infosec Blog | Information Security Tutorials
Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities from inside. Delilah is a strain of malware developed toRead More →
In part one of our web shell series we analyzed recent trends, code bases, and explored defensive mitigations. In part two we investigate a new web shell created by Chinese-speakingRead More →
Sites exploited by SoakSoak bots give the gift of CryptXXX malware. If you’ve visited the do-it-yourself project site of Dunlop Adhesives, the official tourism site for Guatemala, or a numberRead More →
Increasingly, browsers are taking on a central role in our daily lives. With web apps for everything, we have placed our most intimate data on online services such as Facebook,Read More →
Malicious macros made a comeback in 2015 to deliver malware. Now we’re seeing phishing emails use macros in Excel attachments to steal sensitive banking details. In 2015, we saw maliciousRead More →
Office exploit kits updates drop support for CVE-2012-0158. Two newer vulnerabilities targeting the Microsoft Office suite have become very popular in recent months, as Office exploit kit makers have updated theirRead More →
It may be a good idea to stay away from this software. The website of the Ammyy Admin remote desktop management utility has been abused over and over again by malwareRead More →
It’s not the next Stuxnet, says SentinelOne, it’s just very naughty code. Malware hyped as aimed at the hear of power plants is nothing of the sort according to securityRead More →
Hackers who want to make money but don’t want to get involved in the messy business of extracting payment from victims have turned to a malware-as-a-service business model. They write the codeRead More →
The malware dubbed Backdoor.MAC.Eleanor is embedded surreptitiously in the fake app EasyDoc Coverter.app and allows to control your webcam from the dark web Following the first ever instance of macRead More →