Teaching an old RAT new tricks
Attackers have been successfully deploying RATs for years to remotely control users systems – giving them full access to the victim’s files or resources such as cameras, recording key strokes,Read More →
Malware News | Infosec Blog | Information Security Tutorials
Attackers have been successfully deploying RATs for years to remotely control users systems – giving them full access to the victim’s files or resources such as cameras, recording key strokes,Read More →
Exploit kit’s inner workings exposed as researchers help shut down its servers. Security researchers at Cisco Talos and Check Point have published reports detailing the inner workings of Nuclear, an “exploitRead More →
How I Hacked Facebook, and Found Someone’s Backdoor Script(English Version) Foreword As a pentester, I love server-side vulnerabilities more than client-side ones. Why? Because it’s way much cooler to takeRead More →
The authors of the TeslaCrypt ransomware have improved it by implementing new sophisticated evasion techniques and targeting new file types. The authors of the TeslaCrypt ransomware have introduced a couple ofRead More →
Compromised websites remain one of the surefire ways to redirect innocent visitors to exploit kits. During the past few days we’ve started seeing an unusual route to the infamous Angler EK,Read More →
Ransomware has become the scourge of the web in recent months. Hospitals thrust back into the non-digital age, their files locked up until they paid hefty ransoms in Bitcoin. SchoolsRead More →
Google warns that surfing on Google.com is dangerous, here is why!. The world’s top website is partially dangerous for Internet users. We are not saying it but Google itself is claimingRead More →
The Ware Report’s recommendations still important as proven by ransomware and breaches. The National Security Archives at George Washington University has just added a classic text of computer security to itsRead More →
PowerShell scripts seen in around 38% of malware incidents. Microsoft’s PowerShell task automation framework is becoming one of the most popular tools for coding and enhancing malware, a Carbon Black studyRead More →
New evidence collected by prosecutors shows lottery machines were rigged to generate predictable numbers on specific days of the year. Last year, the security director of a US lottery was discoveredRead More →
A new ransomware was discovered that tries to impersonate the well known Locky ransomware. It calls itself Locky and even adds .Locky to encrypted files, but on closer examination there wasRead More →
Security researcher finds malicious code embedded within cameras offered for sale on Amazon. Last week, independent security researcher Mike Olsen discovered that CCTV surveillance rigs sold on Amazon came with pre-installed malware.Read More →
Experts at Cisco Systems discovered more than 3 million vulnerable servers exposed on the Internet while scanning for the presence of JBOSS Backdoor. According to Cisco Systems, more than 3 millionRead More →
Adware installers are out of control and with little or no law regulating them, the crap they push onto their victims is getting worse and worse. Yesterday, while looking throughRead More →
Threat level is not high, the virus requires users to give it root privileges in order to infect their computers. After being bombarded with new malware towards the end ofRead More →
A group of security researchers has found a security flaw in the Apple iMessage that exposed chat history and sensitive data with a single click. Recently WhatsApp has introduced the end-to-endRead More →
Ramdo is a family of malware that performs fraudulent website ‘clicks.’ Ramdo malware activity first surfaced in late 2013 and has since continued to infect machines worldwide, primarily through theRead More →
Rokku is yet another ransomware, discovered in recent weeks. Currently, it’s most common distribution method is spam where a malicious executable is dropped by a VB script belonging to the e-mail’sRead More →
A new ransomware has been released that not only encrypts your files, but also deletes them if you take too long to make the ransom payment of $150 USD. The Jigsaw Ransomware,Read More →
An individual going by the twitter handle leostone was able to create an algorithm that can generate the password used to decrypt a Petya encrypted computer. In my test this, this algorithm was ableRead More →