Malware

  • This malware is related to CryptoWall 3.0 attacks seen in March 2015.
    Read more

  • This malware is involved in Operation Woolen Goldfish, an advanced targeted attack campaign executed by threat actor Rocket Kitten and reported on March 2015. It steals personal information from affected system through keylogging.
    Read more

  • This malware is related to the discovery of the malicious use of the Insert and Link feature in Microsoft Office. Users affected by this malware may have malicious routines exhibited on their systems.
    Read more

  • This Trojan targets routers and attempts to log in to all the devices connected to the routers. It pretends to be an Adobe Flash update.
    Read more

  • This adware comes pre-installed in certain Lenovo laptop models sold between September and December 2014. It may help facilitate man-in-the-middle attacks.
    Read more

  • This malware is related to the reported attack that hit more than 100 banks and financial institutions located in countries like Russia, US, Ukraine, and countries located in the Asia Pacific region. The said attack began in 2013.
    Read more

  • This Trojan is implicated in targeted attacks against several Israeli entities. The attackers are supposedly of Palestine origin.
    Read more

  • This backdoor is loaded onto an affected system via malicious macro code. With its backdoor capabilities, users affected by this malware may find the security of their systems compromised.
    Read more

  • This malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.
    Read more

  • This iOS malware is related to the SEDNIT malware family. It is specifically designed for espionage on iOS devices.
    Read more

Connect with us on