Trojan uses anti-spam system to keep in touch with C&C servers
Most malware is severely crippled if it can’t contact the C&C servers from which it receives its instructions and updates, so malware authors are constantly coming …
Cutwail botnet on spam rampage, delivers Cridex worm
Since its inception some six years ago, the Cutwail / Pandex botnet experienced its fair share of setbacks, but it’s still going strong. The main reason for its …
The arrival of the post-PC threat era
With the release of its 2012 Annual Roundup and Mobile Security reports, Trend Micro documents how cybercriminals have moved beyond the PC, targeting Android, social media and …
Employees targeted with fake DocuSign “confidential message”
An email purportedly sent by the DocuSign Electronic Signature Service on behalf of the administrative departments of a wide variety of organizations and businesses is hitting …
Skype becomes a malware minefield
Skype users should be careful when using the service these days. First CSIS researchers unearthed a campaign misusing Skype to replicate and spread the Shylock banking Trojan …
New RAT family makes its traffic look legitimate
RATs – Remote Access Trojans – are often used by cyber attackers to maintain a foothold in the infected computers and make them do things unbeknownst to their …
Cybercriminals exploit Java 0-day fears to serve malware
With all the recent Java zero-day vulnerabilities being exploited in the wild and Internet news outlets heavily covering the development of the situation, many users will look …
Microsoft AVs not good enough, says AV-Test
AV-Test, the well-known independent organization that tests security software for home and corporate users, has released the results of the latest testing – and …
Bogus “Payroll Declined” emails deliver malware
A malicious email campaign impersonating the Electronic Federal Tax Payment System (EFTPS) – a service offered by the U.S. Department of the Treasury that allows …
ThreatTrack 2.0 plugs malware holes in real-time
GFI Software launched GFI ThreatTrack 2.0, the latest version of the security intelligence solution that provides users with visibility into the threat landscape. It produces …
Bouncer kit perfect for laser-focused phishing campaigns
Researchers have unearthed a new type of phishing kit that allows crooks to target specific users and keep away others in order to keep the scheme hidden from knowing eyes and …
Automated YouTube account generator offered to cyber crooks
You’re a spammer / malware peddler / phisher, and want to register hundreds of bogus accounts on a popular online service such as YouTube in order to lead users to your …
Featured news
Resources
Don't miss
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management
- Hottest cybersecurity open-source tools of the month: December 2024
- The sixth sense of cybersecurity: How AI spots threats before they strike
- reconFTW: Open-source reconnaissance automation