• This Trojan is implicated in targeted attacks against several Israeli entities. The attackers are supposedly of Palestine origin.
    Read more   

  • This backdoor is loaded onto an affected system via malicious macro code. With its backdoor capabilities, users affected by this malware may find the security of their systems compromised.
    Read more   

  • This malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.
    Read more   

  • This iOS malware is related to the SEDNIT malware family. It is specifically designed for espionage on iOS devices.
    Read more   

  • This UPATRE variant is used by DYRE banking malware to arrive in systems via spam emails. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware which is downloaded by DYRE banking malware, has the capability to compose email messages in Microsoft Outlook with the UPATRE malware attached.To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below.
    Read more   

  • This mew malware is related to the release of the Njw0rm malware source code found in early January 2015.To get a one-glance comprehensive view of the behavior of this Hacking Tool, refer to the Threat Diagram shown below.
    Read more   

  • This mew malware is related to the release of the Njw0rm malware source code found in early January 2015.To get a one-glance comprehensive view of the behavior of this Hacking Tool, refer to the Threat Diagram shown below.
    Read more   

  • This malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.
    Read more   

  • This malware was discovered to be involved in a series of malicious campaigns that found victims in Europe, China, Middle East, Africa, India, and Latin America on late January 2015. It comes as an attachment to a spammed mail and downloads a cryptolocker variant onto affected systems.
    Read more