• This Point-of-Sale(PoS) malware was discovered on April 2015 attempting to target certain US-based airports. PoS devices infected by this malware should be considered compromised due to its info-stealing routines.
    Read more   

  • This malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.
    Read more   

  • This is macro-based malware that employed a bogus Air Canada e-ticket with an attached .DOC file.
    Read more   

  • This variant is also known as CryptoWall 3.0.
    Read more   

  • This malware is related to CryptoWall 3.0 attacks seen in March 2015.
    Read more   

  • This malware is involved in the Cryptowall 3.0 attacks detected on March 2015.
    Read more   

  • This malicious JavaScript downloads and executes a CryptoWall 3.0 ransomware variant and a FAREIT spyware.
    Read more   

  • This malware is related to CryptoWall 3.0 attacks seen in March 2015.
    Read more   

  • This malware is involved in Operation Woolen Goldfish, an advanced targeted attack campaign executed by threat actor Rocket Kitten and reported on March 2015. It steals personal information from affected system through keylogging.
    Read more   

  • This malware is related to the discovery of the malicious use of the Insert and Link feature in Microsoft Office. Users affected by this malware may have malicious routines exhibited on their systems.
    Read more