
Ramnit Trojan rides again, targets customers of six major UK banks
The infamous Ramnit Trojan is on the prowl again, and this time it targets personal banking customers of six unnamed UK banks. The Trojan has not changed much since we last …

Twitter-controlled Android backdoor delivers banking malware
A backdoor Trojan named Twitoor is the first instance of Android malware that receives its commands from a Twitter account. Keeping their botnet out of law enforcement’s …

The evolution of BEC scams and ransomware
Trend Micro analyzed the trends in attacks and vulnerabilities seen throughout the first half of this year, and found a rise and impact of attacks, such as a 172 percent …

UK universities hit repeatedly with ransomware, one over 21 times!
63 percent of UK universities have been hit by ransomware – most of them multiple times, and Bournemouth University a total of 21 times in the last year, SentinelOne has …

Researchers design a chip that checks for sabotage
With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install malicious …

Backdoor uses TeamViewer to spy on victims
A backdoor Trojan with spying capabilities that has been previously directed against European and Russian users is now being lobbed at US users, Dr. Web researchers have …

The inner workings of the Cerber ransomware campaign
Check Point’s research team has analysed the inner workings of Cerber, the world’s biggest ransomware-as-a-service scheme. Cerber execution flow Cerber is a ransomware …

Shark Ransomware-as-a-Service: A real threat, a scam, or both?
A new Ransomware-as-a-Service project has sprung up, and the “service providers” are allowing others to use it for free, but take a 20 percent cut out of every …

eBook: Defending against crypto ransomware
Unlike traditional malware, crypto ransomware doesn’t steal information. Instead, it encrypts a victim’s documents, spreadsheets, pictures, videos and other files, and then …

New method for detecting hardware Trojans
Modern computer chips are made up of hundreds of millions – often billions – of transistors. Such complexity enables the smartphone in your back pocket to perform all manner …

Beware of browser hijacker that comes bundled with legitimate software
Lavians, a “small software vendor team,” is packaging its offerings with a variant of browser-hijacking malware Bing.vc. The company sells and offers for free …

Ransomware/RAT combo searches for solvent businesses
The latest version of the Shade ransomware comes with a stealthy remote access Trojan, likely used to better gauge the amount of money the criminals can demand from the …