Please turn on your JavaScript for this page to function normally.
US ICS operators under attack by crims wielding BlackEnergy malware

The US ICS-CERT has issued a warning about an ongoing sophisticated malware campaign that has hit a number of industrial control systems (ICSs) environments using a variant of …

ScanBox keylogging framework lurking on disparate watering holes

Watering hole attacks are usually associated with cyber espionage efforts and are booby-trapped with exploit kits that deliver malware onto the visitors’ vulnerable …

246 percent spike in Apple-themed phishing scams

Phishing scams targeting Apple users saw a dramatic upswing in Q3 of this year. Compared to Q1 2014, Apple users faced a 246% increase in the attacks that masquerade as a …

Cyber security coalition reports on Chinese state-sponsored espionage

Novetta Solutions released multiple reports, the main one being titled “Operation SMN: Axiom Threat Actor Group Report”, which details the characteristics of a …

Tor exit node found patching downloaded binaries with malware

A researcher has spotted a Tor exit node located in Russia which instead of delivering the software requested by users untouched, was adding malicious code to the binaries in …

57% increase in Backoff malware from August to September

Damballa released a new report highlighting the extent to which malware infections, such as Backoff malware, are able to bypass network prevention controls. The report reveals …

Ebola-themed emails deliver malware, exploit Sandworm vulnerability

US CERT has recently issued a warning about malware-delivery campaigns using users’ fear of the Ebola virus and its spreading as a bait. One of the most prolific …

Widespread malvertising campaign targets high-profile sites, delivers ransomware

A newer version of the Cryptowall ransomware has been delivered to unsuspecting Internet users via malicious ads shown on a considerable number of high-profile websites, …

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

In a recently released whitepaper, Trend Micro researchers have shared many details about a long-standing economic and political cyber-espionage operation they dubbed Pawn …

Two exploit kits prey on Flash Player flaw patched only last week

Two exploit kits have been outfitted with the exploit for a Flash Player vulnerability that has been patched only a week ago, the researcher that goes by the handle Kafeine …

Attackers change home routers’ DNS settings via malicious code injected in ads

Sucuri Security researchers have unearthed a malvertising campaign aimed at changing the DNS settings of home routers in order to lead users questionable and potentially …

Koler worm spreads via SMS, holds phones for ransom

A new variant of the Android malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid. AdaptiveMobile detected the …

Don't miss

Cybersecurity news