Reaver malware threat
Palo Alto’s Unit 42 security group has discovered a new malware family called Reaver with links to Chinese espionage group, also known for using SunOrcal malware.
Reaver malware threat Read More »
Securezoo Cybersecurity Threat Center topics on malware.
Palo Alto’s Unit 42 security group has discovered a new malware family called Reaver with links to Chinese espionage group, also known for using SunOrcal malware.
Reaver malware threat Read More »
WikiLeaks has released a new series of leaks, called Vault 8, that contains source code and analysis for software designed to run on servers controlled by the CIA.
WikiLeaks Vault 8 leaks Hive Read More »
Symantec has spotted a previously unknown cyber espionage group called Sowbug that targets South American and Southeast Asian governments.
Sowbug espionage group Read More »
A new Android banking malware dubbed LokiBot can trigger ransomware capabilities when a victim tries to remove the malware from their infected device. According to a Tripwire report , some of the additional features of LokiBot include the ability for attackers to read a victim’s SMS messages and also send out spam email to infect other users. The
LokiBot malware threat Read More »
Security researchers discovered a supply chain threat used to distribute a backdoor and multi-stage malware via legitimate software package CCleaner.
CCleaner application backdoor Read More »
The Zscaler ThreatLabZ research team has spotted a new remote access Trojan (RAT) family called Cobian RAT that contains a backdoor module, which retrieves command and control (C&C) information from a predetermined URL that is controlled by the original author.
Cobian RAT backdoor threat Read More »
USB flash drives can often be a threat to your organization as malicious insiders could use them to steal your most sensitive data. Organizations should also be aware that USB drives can also be used to plant malware, such as backdoors and fileless malware.
USB drives used to plant malware Read More »
Cyber criminals and mobile malware authors with very little coding experience can now create Android ransomware automatically using Trojan Development Kits (TDKs).
Android ransomware uses Trojan Development Kits (TDKs) Read More »
Trend Micro’s Threat Response Team has uncovered an auto-clicking GhostClicker adware in up to 340 apps in Google Play, to include one mobile app “Aladdin’s Adventure’s World” that was downloaded five million times. As of August 7, there were still 101 affected apps that could be downloaded. Trend Micro describes the adware in recent report: “Trend Micro detects
GhostClicker adware threat Read More »
Security researchers have discovered a backdoor planted in connectivity tools made by NetSarang, to include popular products Xshell, Xmanager, Xftp and Xlpd.
Connectivity tools used to plant backdoors Read More »