6.1 C
London
Friday, December 13, 2019
The French law enforcement agency, National Gendarmerie, today announced the successful takedown of one of the largest wide-spread RETADUP botnet malware and how it remotely disinfected more than 850,000 computers worldwide with the help of researchers. Earlier this year, security researchers at Avast antivirus firm, who were actively...
The malware is believed to have been created by US and Israeli intelligence agencies.Stuxnet is designed to alter Programmable Logic Controllers (PLCs) used in the types of industrial control systems (ICS). The Stuxnet malware has made a powerful comeback after a hiatus of eight...
Quasar Remote Access Trojan uses two methods to achieve persistence such as scheduled tasks and registry keys.Its capabilities include capturing screenshots, recording webcam, reversing proxy, editing registry, spying on the user’s actions, keylogging and stealing passwords. Quasar is a publicly available open-source Remote Access...
Some hackers use malicious code, but most just hide in plain sight. It can be devastatingly effective When their computer or social media account is hijacked by an unknown entity, most people probably picture something like this: a faceless man hunched over a...
It's an art piece containing six pieces of malware responsible for $95 billion worth of damage, and it just sold at auction for $1.345 million. Nobody would deliberately install malware on a laptop they intend to use, but doing so in the name...
Real VPN client comes bundled with banking Trojan Criminals are cloning the website of popular VPN software to try and trick users into downloading malware. According to new research, the cybercriminals responsible for breaching and utilizing the website of the free video editor VSDC to...
Emotet is now one of the top threats, its infrastructure being used to distribute Trickbot, another banking trojan, and then spread the Ryuk ransomware. This combination is dubbed 'triple threat' and has affected public administrations in the U.S. Researchers noticed that Emotet operators took...
ESET researchers have discovered the first known spyware that is built on the foundations of AhMyth open-source malware and has circumvented Google's app-vetting process says Lukas Stefanko from welivesecurity sites. "AhMyth, the open-source Remote Access Tool from which the Radio Balouch app borrowed its malicious functionality, was made publicly...
A malicious package was removed today from the npm repository after it was discovered that it stole login information from the computers it was installed on. The npm repository is a popular online database for open-source packages that are often used as dependencies in...
Researcher Tomas Foltyn from Welivesecurity has posted yesterday, many 23 government organizations across Texas are reeling from an apparently "coordinated ransomware attack", an alert from the Texas Department of Information Resources (DIR) reveals. "The incident occurred last Friday and for the most part affected smaller...
Cyber-Security is much more than a matter of IT
It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it