Ransomware: Return of the mac(ro)
Ransomware attackers have resorted to reviving a very old attack vector, the malicious Word macro.Read More
Ransomware attackers have resorted to reviving a very old attack vector, the malicious Word macro.Read More
Law enforcement agencies and security vendors join forces to take down long running malware delivery network.Read More
A new information stealer, Trojan.Laziok, acts as a reconnaissance tool allowing attackers to gather information and tailor their attack methods for each compromised computer.Read More
Una nueva amenaza que roba información, denominada Trojan.Laziok, actúa como una herramienta de reconocimiento y permite a los atacantes recopilar información y adaptar sus métodos de ataque a cada computadora comprometida.
Read More
Attackers have been compromising users’ computers to add them to botnets, which are rented out to artificially inflate Twitch channel audience numbers.
Read More
Lone spam operator impersonated major brands and reality TV stars to promote miracle diet pill spam.Read More
Operador solitário de spam se fez passar por grandes marcas e estrelas de reality shows para promover spam de pílula de dieta milagrosa
Read More
Un operador de spam solitario logró que grandes marcas y estrellas de TV promovieran pastillas milagrosas para bajar de peso
Read More
The road to success is never straightforward. This is a tale of a RAT developer’s persistence in the face of endless setbacks.
Read More
Vulnerability (CVE-2015-0291) rated as high severity by OpenSSL.Read More