Teaching an old RAT new tricks
Attackers have been successfully deploying RATs for years to remotely control users systems – giving them full access to the victim’s files or resources such as cameras, recording key strokes,Read More →
Attackers have been successfully deploying RATs for years to remotely control users systems – giving them full access to the victim’s files or resources such as cameras, recording key strokes,Read More →
Google warns that surfing on Google.com is dangerous, here is why!. The world’s top website is partially dangerous for Internet users. We are not saying it but Google itself is claimingRead More →
PowerShell scripts seen in around 38% of malware incidents. Microsoft’s PowerShell task automation framework is becoming one of the most popular tools for coding and enhancing malware, a Carbon Black studyRead More →
Security researcher finds malicious code embedded within cameras offered for sale on Amazon. Last week, independent security researcher Mike Olsen discovered that CCTV surveillance rigs sold on Amazon came with pre-installed malware.Read More →
Attacks against home routers have been going around for years—from malware that rigs routers to DNS rebinding attacks and backdoors, among others. Just last year one of our researchers reportedRead More →
Beware, even things on Amazon come with embedded malware… this is the disconcerting discovery made by the expert Mark Olsen. The security expert Mike Olsen warned about the presence of malware in productsRead More →
Technology vendor Cisco is pushing out security updates to customers to address a critical vulnerability found in its recently introduced line of FirePower firewall products. The vulnerability, according to Cisco, allowsRead More →
The fix? No patch, just destroy all extensions. Black Hat Asia The most popular Firefox extensions with millions of active users are open to attacks that can quietly compromise machines andRead More →
Brazilian malware continues to evolve day by day, making it increasingly sophisticated. If you want to know how the various malicious programs work nowadays, you can jump to the correspondingRead More →
As more US companies snuff out point of sale malware by deploying chip-and-PIN bankcard technology, attackers are rushing to exploit existing magnetic strip card systems still vulnerable to malware. ARead More →
Gumtree is a free classified advertising site and subsidiary of eBay particular popular in the UK, Australia, and South Africa. Gumtree is the number one local classifieds in Australia with 47.8M monthly visits* andRead More →
How-to guide also included, showing sysadmins how to protect their enterprises from malicious macro malware. Microsoft is finally addressing the elephant in the room in terms of security for Office usersRead More →
Legitimate code-signing certificates provide secret cover for attack groups. There are lots of ways to ensure the success of an advanced hacking operation. For a gang called Suckfly, one of theRead More →
Researchers analyze five AV-made system repair tools.System rescue tools provided by antivirus makers are often used to clean infected systems after the main antivirus software detects infections. Most antivirus makersRead More →
Diplomats and military personnel in India have been victimized in targeted espionage attacks that use a number of means of infection including phishing and watering hole sites. Researchers at ProofpointRead More →
Spam posts on Facebook are nothing new. Since videos continue to be a staple form of entertainment—a whopping 8 billion views per day according to last year’s numbers—within the socialRead More →
Until recently, sample wasn’t detected by any of the top antivirus programs. Researchers have uncovered what appears to be newly developed Mac malware from HackingTeam, a discovery that’s prompting speculation thatRead More →
4.1% of all sanctioned cloud apps are laced with malware. During the past month, cloud security analysts have seen more and more malware spreading from one PC to another in aRead More →
Most ISPs that engage in this practice are owned by two of Asia’s biggest network operators, both located in China. Three researchers from Israel have conducted a study on theRead More →
Survey, YouTube offer proof that people are blowing up ATMs to get the cash inside. What was the best way to steal cash from an ATM in 2015? Skimming stillRead More →