Search
Keyword: link
As creatures of habit, cybercriminals have become predictable when it comes to their social engineering tactics. They tend to leverage newsworthy items
like calamities, celebrity news, and up...
With the death of former Libyan leader Muammar Gadhafi comes a slew of socially-engineered spam taking advantage of this historical event. The first variant of the received spam claims to be a CNN newslet...
Pinterest has actively been used in different spam campaigns in the past - from basic phishing to complicated spam techniques incorporating salad words and invisible ink. Blackhole Exploit Ki...
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is...
We have observed a recent spike in spam in Russian language. The spammed message delivers a SHADE ransomware variant via embedded link in the attached .PDF. Upon investigation, this camp...
Fake voicemail email notifications with malicious attachments and/or links appear to be in vogue with cybercriminals today, as our engineers have begun to receive samples of this type of spam campai...
The world was on a standstill on May 2 when US President Barrack Obama announced the death of Osama bin Laden. After almost a decade since the 9/11 tragedy, Al-Qaeda's notorious leader was killed during a US ...
Cybercriminals are constantly thinking of elaborate schemes to trick users into giving up their information. We spotted a phishing email that pretends to be from the Philippine bank China Bank. A supposed security...
This spammed message comes as an empty email with a subject written in German. Similar to most spam of this nature, this spammed message pretends to be a delivery notification from DHL, a known logistics company. The atta...
This security update addresses a vulnerability in Microsoft Windows, which could allow remote code execution if a user clicks a specially crafted link, ...
Trend Micro researchers spotted another spammed email messages purporting to be from popular social networking sites LinkedIn and MySpace. The mail from LinkedIn asks the use...
An email message that pretends to be an account security notification from Norton tells its victim of a supposed unusual account activity. The email message urges the recipient to update a...
With the hype of the iPhone 6 increasing, cybercriminals scrambling to take advantage of it is already a forgone conclusion. This is the case here, as our engineers have found spam sa...
Our engineers recently came across samples of a spammed mail purpotedly coming from someone in the National Disability Insurance Scheme department of the Australian...
This Trojan may be hosted on a website and run when a user accesses the said website.