Please turn on your JavaScript for this page to function normally.
Top 5 malware attacks: 35 reused components

CyActive identified the top five malware that returned the highest ROI for hackers with the least effort per dollar — achieved by recycling code and using the same methods …

TorrentLocker exposed: Investigation and analysis

ESET researchers analyzed a widespread case of ransomware generally known as TorrentLocker, which started spreading in early 2014. The latest variant of the malware has …

Attackers worm their way into QNAP NAS devices through Shellshock hole

A worm intent on creating surreptitious backdoors is actively being used to compromise unpatched QNAP network-attached storage (NAS) systems around the world by exploiting the …

100k+ WP websites compromised by SoakSoak malware

Sucuri Security researchers are warning about a massive compromise of WordPress sites sporting malicious JavaScript leading visitors to malware. The discovery was made on …

Two newcomers in the exploit kit market

Exploit kits are a great means to an end for malware distributors, who either buy them or rent them in order to widely disseminate their malicious wares. It’s no wonder …

Linux backdoor used by Turla APT attackers discovered, analyzed

Kaspersky Lab researchers have discovered a new piece of the puzzle called Turla (aka Snake, aka Uroburos): the malware used by attackers does not come only in the Windows …

Sony hack: Lousy security, customized malware linked to previous attacks

The security picture painted by the stolen and leaked documents from Sony Pictures Entertainment becomes uglier by the day, as several companies and news outlets continue to …

Pre-loaded malware on new Android phones is on the rise

The danger of having your Android handset come preloaded with malware is rising, especially if you live in Asia and Africa and are on the market for a cheap, low-level phone. …

New LusyPOS malware is a cross between Dexter and Chewbacca

A new piece of Point-of-Sale RAM scraping malware has been submitted to VirusTotal and analyzed by researchers, who found that it’s a cross between two older and …

FBI issues warning on destructive malware

Last week’s breach of Sony Pictures Entertainment networks and the disabling of employees’ computers has likely been the incident that spurred the FBI to release a …

Tens of thousands web servers backdoored via pirated CMS themes and plug-ins

Over 23,000 websites set up with the help of Joomla, WordPress and Drupal content management systems have been compromised and used for illegal search engine optimization by …

Regin spy malware was used in Belgacom, EU government hacks

Which nation state is behind the sophisticated Regin espionage malware? According to The Intercept, it’s likely wielded by the UK spy agency GCHQ and/or the US NSA. The …

Don't miss

Cybersecurity news