New FSociety Ransomware pays homage to Mr. Robot
Crooks hijack the FSociety brand for a lame ransomware. Fans of the Mr. Robot TV show would be glad to know that real-life crooks are taking inspiration from the TV series,Read More →
Crooks hijack the FSociety brand for a lame ransomware. Fans of the Mr. Robot TV show would be glad to know that real-life crooks are taking inspiration from the TV series,Read More →
Chrome, Firefox and likely other major browsers are afflicted by a vulnerability that allows attackers to spoof URLs in the address bar. While Mozilla said it has patched the flawRead More →
The smart plug can act as a conduit not just for electricity — but for cyberattacks. Researchers have discovered critical security flaws in connected smart plugs which can give attackers accessRead More →
The Adwind Remote Access Trojan (RAT) is a popular Java-based backdoor capable of infecting Windows, Linux, Mac OS and Android operating systems. Its cross-platform nature, elaborate backdoor features, and relativelyRead More →
Palo Alto Networks has identified a malware family known as ‘Aveo’ that is being used to target Japanese speaking users. The ‘Aveo’ malware name comes from an embedded debug stringRead More →
Malicious attachment contains Adwind cross-platform remote access Trojan. Cybercriminals are using clickbait, promising a video showing Democratic Party presidential nominee Hillary Clinton exchanging money with an ISIS leader, in order toRead More →
If the malware found any German financial apps installed in the device, it would show a fake page asking for credentials of that particular institution. Unaware that the login pageRead More →
Former NSA security scientist concurs exposure by “Equation Group” connected to DNC leak. Two former employees of the National Security Agency—including exiled whistleblower Edward Snowden—are speculating that Monday’s leak of whatRead More →
Many people don’t truly understand the extent to which computers control in the modern world. Everything from stoplights at busy intersections to power plants have automated systems, and for goodRead More →
Proofpoint researchers originally discovered the Panda Banker malware in February, 2016 [1]. At the time, it was being distributed via both targeted email campaigns and exploit kits (EKs). The instanceRead More →