Search
Keyword: a virtual card for you
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a specific en...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a specific en...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It executes commands from a re...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a specific ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a specific en...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a specific en...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It executes commands from a ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses a file name similar to a legitimate file to pass as a legitimate file.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It opens a random port to allow a remote user to connect to the affected system. Once a successful connec...
It is a script that may be used to compromise a server running a vulnerable PHP application.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the downloaded files. As a result, mali...
What is a data breach?
A data breach refers to the exfiltration—the release of data from a system without the knowledge or consent of its owner. This data resides in the targeted organization’s systems or networks and is pro...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system. It conne...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.It steals...
Microsoft addresses the following vulnerabilities in its July batch of patches:
(MS11-053) Vulnerability in Bluetooth Stack Could Allow Remote Code Execution (2566220)
Risk Rating: Critical
This s...
This is a backdoor builder written in Java. It has been seen as a free download in underground forums. This opens a possibility that malicious users may use this tool to create a connect-back client .JAR file on the infected computer.To get a one-gla...
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It acts as a Browser Helper Object (BHO) that monitors a user's Internet-browsing habits.
Microsoft addresses the following vulnerabilities in its October batch of patches:
(MS13-088) Cumulative Security Update for Internet Explorer (2888505)
Risk Rating: Critical
This securit...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses a file name similar to a legitimate file to pass as a legitimate file.It saves downloaded files int...