Please turn on your JavaScript for this page to function normally.
Twitter malware
Twitter-controlled Android backdoor delivers banking malware

A backdoor Trojan named Twitoor is the first instance of Android malware that receives its commands from a Twitter account. Keeping their botnet out of law enforcement’s …

biohazard
The evolution of BEC scams and ransomware

Trend Micro analyzed the trends in attacks and vulnerabilities seen throughout the first half of this year, and found a rise and impact of attacks, such as a 172 percent …

skull
UK universities hit repeatedly with ransomware, one over 21 times!

63 percent of UK universities have been hit by ransomware – most of them multiple times, and Bournemouth University a total of 21 times in the last year, SentinelOne has …

chip
Researchers design a chip that checks for sabotage

With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install malicious …

TeamViewer
Backdoor uses TeamViewer to spy on victims

A backdoor Trojan with spying capabilities that has been previously directed against European and Russian users is now being lobbed at US users, Dr. Web researchers have …

danger
The inner workings of the Cerber ransomware campaign

Check Point’s research team has analysed the inner workings of Cerber, the world’s biggest ransomware-as-a-service scheme. Cerber execution flow Cerber is a ransomware …

Shark Ransomware-as-a-Service: A real threat, a scam, or both?

A new Ransomware-as-a-Service project has sprung up, and the “service providers” are allowing others to use it for free, but take a 20 percent cut out of every …

Defending against crypto ransomware
eBook: Defending against crypto ransomware

Unlike traditional malware, crypto ransomware doesn’t steal information. Instead, it encrypts a victim’s documents, spreadsheets, pictures, videos and other files, and then …

magnify
New method for detecting hardware Trojans

Modern computer chips are made up of hundreds of millions – often billions – of transistors. Such complexity enables the smartphone in your back pocket to perform all manner …

FixBrowserRedirect
Beware of browser hijacker that comes bundled with legitimate software

Lavians, a “small software vendor team,” is packaging its offerings with a variant of browser-hijacking malware Bing.vc. The company sells and offers for free …

Lock
Ransomware/RAT combo searches for solvent businesses

The latest version of the Shade ransomware comes with a stealthy remote access Trojan, likely used to better gauge the amount of money the criminals can demand from the …

world biohazard
Financial malware attacks increase as malware creators join forces

Kaspersky Lab blocked 1,132,031 financial malware attacks on users, a rise of 15.6 percent compared to the previous quarter, according to the results of the company’s IT …

Don't miss

Cybersecurity news