Tag

search for malware
Smoke Loader Malware just got heavier with PROPagate Injection
A malicious downloader malware called Smoke Loader, which sporadically infected victims since 2011, has gotten active this year with a new method to spread the infection to Windows users. Like most malware, it tricks the victim into downloading a sketchy Microsoft Word document from a spam invoice email with unknown sender, and then prompts the...
Continue Reading
Phishing and Fraud Opportunities on the Vulnerability
Phishing and Fraud Opportunities on the Vulnerability: Root access on most devices is severe to the point that everything on your machine can be copied and sniffed out to a hacker’s computer. Search for malware alone won’t suffice, because vulnerabilities cannot be simply scanned through normal malware protection, so much for malware detection alone too....
Continue Reading
Google Images Plagued by Malwares
Cyber attackers are getting really creative and resourceful when it comes to infecting users and machines with Malwares. It’s as if regular hacking of websites and servers is not enough, these criminals are now targeting legit hosted websites and its images, and using them as a tool to exploit vulnerabilities while remaining undetected. What’s even...
Continue Reading
EmoTet Malware
Anne Arundel County Library computers were just exposed to a computer virus, prompting officials to take the computers out of service and ask customers to monitor personal information for fraudulent activity. About 600 terminals were reportedly breached. It was announced Saturday that the computers were exposed to a virus called Emotet, which targets users through...
Continue Reading
PGA Americas Held Ransom for Bitcoins - iZOOlogic
Cyber Attackers have taken over the control of computer servers belonging to the PGA of America, demanding a bitcoin ransom from the famed golf association in order to return control to them. Officials were locked out of critical files that relate to the PGA Championship and the upcoming Ryder Cup in France. While trying to...
Continue Reading
The US Military Just Publicly Dumped Russian Government Malware Online
Joint effort In an effort to improve information sharing Cybersecurity professional Russian is now the recipient of this so called “enemies files” from US CYBERCOM. This may have been ironic as enemy usually dump files, this time Russia began publicly freeing unclassified samples of adversaries’ malware it has found out. As per Joseph R. Holstead, acting director...
Continue Reading
Security Weakpoint Impacts Multiple Linux and BSD Distros
All Linux and BSD variations that use the X.Org server bundle contain a powerlessness, security scientists as of late unveiled. This blemish could enable an assailant with restricted benefits to raise benefits and gain root framework get to, either utilizing a terminal or SSH session. Commonly, if a powerless variant of X.Org keeps running on...
Continue Reading
Malvertisement: The Covert Advert
Malvertising Sounds like a mouthful, I know. But it’s a word-blend (postmanteau) between Malware and Advertising. To put it simply, the use of online advertisement to spread Malware. Malvertising is what occurs when online advertising is used to spread malwares. Malvertising is what ensues when attackers purchase ad spaces in famous or legitimate websites and...
Continue Reading
Windows Malware Mylobot
High-level Windows Malware, Mylobot, Deploys Deadly Botnet Tactics A new Windows malware is adding systems into a botnet. It takes absolute control of its victims and also deliver additional malicious payloads. As far as the investigation goes, whoever’s the author of Mylobot malware campaign has to be a sophisticated and certainly capable hacker. To understand...
Continue Reading
phishing and malware attacks
Cybercriminals have a large range of tools and resources to launch phishing and malware attacks against online platforms. The dark web provides fertile grounds for criminals to opening discuss methodologies and trade new malware variants, types and processes. From well-established banking malware, such as Dyre, ZeuS and Kronos, to more recently discovered malware, such as...
Continue Reading
1 2

Categories