Cisco Sinkholes GozNym Banking Trojan Botnet
GozNym botnet included over 23,000 infected victims. The Cisco Talos team has announced today that they’ve successfully managed to sinkhole one of GozNym’s botnets and are in the process ofRead More →
GozNym botnet included over 23,000 infected victims. The Cisco Talos team has announced today that they’ve successfully managed to sinkhole one of GozNym’s botnets and are in the process ofRead More →
Researchers at the Bellingcat agency have been hit with spear phishing attacks and account takeover attempts while investigating flight MH17 crash. Once again cyber security experts warn of a newRead More →
Once unthinkable, 1 terabit attacks may soon be the new normal. Last week, security news site KrebsOnSecurity went dark for more than 24 hours following what was believed to be aRead More →
Today we bring you Princess Locker; the ransomware only royalty could love. First discovered byMichael Gillespie, Princess Locker encrypts a victim’s data and then demands a hefty ransom amount ofRead More →
Unlock92 infections going under the radar. A ransomware variant that appeared in early July this year and was initially cracked and decrypted has quietly resurfaced in mid-August and has beenRead More →
Now, this first one isn’t such a huge issue as it would require physical proximity to the router, at the same time that the user is trying to do aRead More →
The hosting provider OVH continues to face massive DDoS attacks launched by a botnet composed at least of 150000 IoT devices. Last week, the hosting provider OVH faced 1Tbps DDoS attack,Read More →
Two years after its first version, osquery gets Windows port. Facebook’s insanely popular osquery project is now available for Windows after it was launched in 2014 with support for only MacRead More →
Ars reports from the Linux Security Summit—and finds much work that needs to be done. The Linux kernel today faces an unprecedented safety crisis. Much like when Ralph Nader famouslyRead More →
We recently observed Hancitor attacks against some of our FireEye Exploit Guard customers. The malicious document used to deliver the Hancitor executable was observed being distributed as an attachment inRead More →