Teaching an old RAT new tricks
Attackers have been successfully deploying RATs for years to remotely control users systems – giving them full access to the victim’s files or resources such as cameras, recording key strokes,Read More →
Attackers have been successfully deploying RATs for years to remotely control users systems – giving them full access to the victim’s files or resources such as cameras, recording key strokes,Read More →
Google warns that surfing on Google.com is dangerous, here is why!. The world’s top website is partially dangerous for Internet users. We are not saying it but Google itself is claimingRead More →
PowerShell scripts seen in around 38% of malware incidents. Microsoft’s PowerShell task automation framework is becoming one of the most popular tools for coding and enhancing malware, a Carbon Black studyRead More →
Security researcher finds malicious code embedded within cameras offered for sale on Amazon. Last week, independent security researcher Mike Olsen discovered that CCTV surveillance rigs sold on Amazon came with pre-installed malware.Read More →
Attacks against home routers have been going around for years—from malware that rigs routers to DNS rebinding attacks and backdoors, among others. Just last year one of our researchers reportedRead More →
Beware, even things on Amazon come with embedded malware… this is the disconcerting discovery made by the expert Mark Olsen. The security expert Mike Olsen warned about the presence of malware in productsRead More →
Technology vendor Cisco is pushing out security updates to customers to address a critical vulnerability found in its recently introduced line of FirePower firewall products. The vulnerability, according to Cisco, allowsRead More →
The fix? No patch, just destroy all extensions. Black Hat Asia The most popular Firefox extensions with millions of active users are open to attacks that can quietly compromise machines andRead More →
Brazilian malware continues to evolve day by day, making it increasingly sophisticated. If you want to know how the various malicious programs work nowadays, you can jump to the correspondingRead More →
As more US companies snuff out point of sale malware by deploying chip-and-PIN bankcard technology, attackers are rushing to exploit existing magnetic strip card systems still vulnerable to malware. ARead More →