Forget Mirai – Brickerbot malware will kill your crap IoT devices
Rogue code aims to create permanent DoS. A new form of attack code has come to town and it uses techniques similar to Mirai to permanently scramble Internet of ThingsRead More →
Malware News | Infosec Blog | Information Security Tutorials
Rogue code aims to create permanent DoS. A new form of attack code has come to town and it uses techniques similar to Mirai to permanently scramble Internet of ThingsRead More →
Creator apologizes for a “joke” that really requires expert play to unlock files. At this point, Ars readers have heard countless tales of computer users being forced to pay significantRead More →
Brad Duncan, a Threat Intelligence Analyst for Palo Alto Networks Unit 42, has recently started seeing the EITest campaign use the RIG exploit kit to distribute the Matrix ransomware. While MatrixRead More →
This article sheds light on the current ecosystem of the Sathurbot backdoor trojan, in particular exposing its use of torrents as a delivery medium and its distributed brute-forcing of weakRead More →
A new malware strain called BrickerBot is bricking Internet of Things (IoT) devices around the world by corrupting their storage capability and reconfiguring kernel parameters. Detected via honeypot servers maintainedRead More →
An Indian developer is playing around with an open source ransomware builder, which in the long run may end up causing serious problems for innocent users. This developer, who goesRead More →
Embedding a shortcut (.lnk file) which points to powershell (accompanied by an encoded command) in a word document or zip file is a known sneaky trick to spread malware. TheRead More →
The malware can snoop on people’s conversations, act as keylogger, take screenshots, control camera and microphone. A new Android RAT malware was detected in the wild, and it is consideredRead More →
Security experts at CISCO Talos have spotted a new insidious remote access tool dubbed ROKRAT that implements sophisticated anti-detection measures. Security experts at CISCO Talos have spotted a new insidiousRead More →
A cyber-espionage group that first surfaced in 2009 is using a novel tactic into hacking its targets by first breaching one of its cloud service providers, and then reaching insideRead More →