Malware

Detect ransomware before it's too late with AlienVault USM

By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network.

Finland detains Russian citizen accused of computer fraud in U.S.

Finland detains Russian citizen accused of computer fraud in U.S.

Finnish authorities nabbed Russian citizen Maxim Senakh, wanted in the U.S. on computer fraud charges for spreading malware.

Symantec identifies 49 new modules associated with Regin

Symantec identifies 49 new modules associated with Regin

The Regin Trojan is alive thriving in the wild despite being uncovered by Symantec last year.

Scanner identifies thousands of malicious Android apps on Google Play, other markets

Scanner identifies thousands of malicious Android apps on Google Play, other markets

By

A team of researchers created an app vetting scanner referred to as "MassVet," and used it to identify 127,429 malicious apps on 33 Android markets.

FireEye intern pleads guilty in Darkode case

FireEye intern pleads guilty in Darkode case

By

Malware author Morgan Culbertson pleaded guilty on Tuesday in a Pittsburgh federal court.

Zero-Day, Angler kit exploits help drive up malvertising by 325%

Zero-Day, Angler kit exploits help drive up malvertising by 325%

By

Cyphort Labs's latest study on malvertising indicates a massive uptick with this form of attack has taken place over the last few years driven, in part, by the proliferation of zero-day and Angler kit exploits.

Just patched Internet Explorer bug being exploited in watering hole attack

Just patched Internet Explorer bug being exploited in watering hole attack

By

A Hong Kong-based website has been compromised to serve up malware through a just patched memory corruption vulnerability in Internet Explorer.

WordPress sites redirect to Neutrino EK, CryptoWall pushed via Flash exploit

WordPress sites redirect to Neutrino EK, CryptoWall pushed via Flash exploit

By

Zscaler has been seeing attackers targeting WordPress sites running version 4.2 and lower.

Darkode hacker "Phastman" pleads guilty in federal court

Darkode hacker "Phastman" pleads guilty in federal court

By

The FBI announced that Darkode hacker Eric Crocker, known as "Phastman," pleaded guilty on Monday for sending spam.

E-ZPass users targeted in phishing scam

E-ZPass users targeted in phishing scam

By

Drivers in the Washington, D.C. metro area are being targeted by a phishing scam that purports to come from E-ZPass.

Phishing scams, malicious attachments top, threat report reveals

Phishing scams, malicious attachments top, threat report reveals

By

Hackers went old school during the first half of 2015, resurrecting the use of malicious email attachments and also began targeting businesses with a new stream of phishing attacks, according to Proofpoint's first half threat report.

Symantec spots tech support scammers using links on popular sites to lure victims

By

Researchers have spotted attackers using fake Facebook accounts to post malicious links in the comments of popular content.

Yahoo malvertising actors turn attention to AdSpirit

By

Researchers at Malwarebytes uncovered a malvertising campaign against AdSpirit.de, similar to the one used recently on Yahoo.

Android ransomware locks up devices, has additional features

By

The malware was detected by Fortinet as Android/Locker.CB!tr and is capable of receiving a variety of commands.

Asprox botnet mostly disappeared in 2015

Asprox botnet mostly disappeared in 2015

By

Researchers say that campaigns leveraging the Asprox botnet have disappeared after reaching a peak last year.

Darkhotel APT group phases out hotel Wi-Fi infections, brings in Hacking Team zero-day

Darkhotel APT group phases out hotel Wi-Fi infections, brings in Hacking Team zero-day

By

The Darkhotel APT group swapped out its previous Flash zero-days this past month for an exposed Hacking Team zero-day.

U.K. ham radio operators spammed with malware

By

U.K. ham radio operators are the target of a phishing scam asking them to open a malware-infected attachment purportedly from Ofcom Spectrum Licensing.

21st century defense-In-depth involves more than 2 AVs

If one AV is good, are two AVs better defense against APTs, ransomware and other sophisticated malware? That's the way we used to do it back in the '80s and '90s, but does this approach still work?

Hackers spread malware via Yahoo ads

Hackers spread malware via Yahoo ads

By

The same hackers that have exploited vulnerabilities of Adobe Flash have used advertising on Yahoo's largest websites to distribute malware to billions.

Report delves into RAT videos on YouTube

Report delves into RAT videos on YouTube

By

Remote Access Trojans (RATs) proliferate through YouTube tutorials and hacker forums, a new report from Digital Citizens Alliance suggested.

Modular Potao malware used to spy on targets in Ukraine, Russia

Modular Potao malware used to spy on targets in Ukraine, Russia

By

Potao was first being used against targets in Russia, but after a lull in activity, malware activity increased against targets in Ukraine.

HAMMERTOSS malware represents culmination of 'best practices' for cyber attackers

HAMMERTOSS malware represents culmination of 'best practices' for cyber attackers

By

Cybersecurity firm FireEye released a new report on APT29's complex malware HAMMERTOSS.

Researchers analyze faulty new Linux backdoor

By

Researchers at Dr. Web have discovered a faulty trojan designed as a backdoor for Linux that could also target Windows systems.

'GSMem' malware designed to infiltrate air-gapped computers, steal data

'GSMem' malware designed to infiltrate air-gapped computers, steal data

By

Israeli researchers detailed a new attack that can steal data from air-gapped computers, which are often seen as relatively safe.

Duke APT group devises new campaigns to maintain detection evasion

By

The Duke APT group continues to change up its tactics with the new "SeaDuke" and "CloudDuke" malware.

Fake games in Google Play redirect Android users to porn sites

Fake games in Google Play redirect Android users to porn sites

By

The threat is detected by Avast as Clicker-AR, and by requesting a certain permission it can redirect Android users to porn sites via their browser or other apps.

Free security tools help detect Hacking Team malware

Free security tools help detect Hacking Team malware

By

Vulnerabilities and other threats exposed in the Hacking Team leaks has spurred Rook Security and Facebook to each release free security tools.

Abandon XP! Malware is coming to get you

Abandon XP! Malware is coming to get you

Windows XP infections are set to skyrocket as Microsoft finally ends support for its anti-malware and malicious software removal tool.

Andromeda botnet used to distribute new point-of-sale malware

Andromeda botnet used to distribute new point-of-sale malware

By

Researchers with Trend Micro observed the malware threat being distributed predominately in the U.S. and Canada.

TeslaCrypt 2.0 comes with stronger encryption and a CryptoWall disguise

TeslaCrypt 2.0 comes with stronger encryption and a CryptoWall disguise

By

Mainly known for its targeting of gaming files, TeslaCrypt continues to re-up its techniques to make it a debilitating threat.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US