• Games
  • By Cosmin Vasile
  • May 31st, 2020
The Most Anticipated Game Releases of June 2020

The Most Anticipated Game Releases of June 2020

A month dominated by Sony's The Last of Us Part II

  • Security
  • By Catalin Cimpanu
  • February 5th, 2016
White Hat Pwns Dridex Botnet to Push Avira Antivirus Instead of Malware

White Hat Pwns Dridex Botnet to Push Avira Antivirus Instead of Malware

How about a free antivirus instead of some Dridex malware?

  • Security
  • By Catalin Cimpanu
  • November 19th, 2015
Malware Turns to DNS and Steganography to Hide C&C Communications

Malware Turns to DNS and Steganography to Hide C&C Communications

Malware operations evolve in a clever way

Researcher Leverages Increased Twitter DM Size to Control Botnet

Researcher Leverages Increased Twitter DM Size to Control Botnet

The tool allows botnet operators to manage their infrastructure without exposing their activities on their Twitter page

Vawtrak Trojan Hides Updated Server List in Website Icons

Vawtrak Trojan Hides Updated Server List in Website Icons

Over 13,000 Canadians affected by recent Vawtrak campaign

Ramnit Malware Infects over 500,000 in Six Months, Disables Microsoft Security Components

Ramnit Malware Infects over 500,000 in Six Months, Disables Microsoft Security Components

Anti-AV module was first seen back in 2013

Number of Botnet Control Servers Increased in 2014 – Report

Number of Botnet Control Servers Increased in 2014 – Report

Russian networks hosted most of the botnet control IPs

Rogue Code Injected in Industrial Site for Reconnaissance Purposes

Rogue Code Injected in Industrial Site for Reconnaissance Purposes

Attackers possibly planning a watering hole attack

PushDo Trojan Variant Has New Domain Generation Algorithm

PushDo Trojan Variant Has New Domain Generation Algorithm

More than 2,000 IP addresses connected to the researchers’ sinkhole

Incoming 2014 – Command & Conquer 5

Incoming 2014 – Command & Conquer 5

The last C&C title was cancelled in October, the future is uncertain

Hackers Abuse Google Cloud Messaging Service in Android Malware Attacks

Hackers Abuse Google Cloud Messaging Service in Android Malware Attacks

Kaspersky researchers have analyzed the attacks and they've notified Google

Malware Developers Migrate ZeuS P2P Protocol to New Port Range

Malware Developers Migrate ZeuS P2P Protocol to New Port Range

Damballa experts say the 1024 – 10000 range is now used for C&C communications

Experts Reveal How Chinese APT Hackers Abuse Dropbox and WordPress

Experts Reveal How Chinese APT Hackers Abuse Dropbox and WordPress

Cyber Squared has released an interesting report on the topic

184 Countries Host Crimeware Servers, Most from Asia and Eastern Europe

184 Countries Host Crimeware Servers, Most from Asia and Eastern Europe

FireEye has released “The Advanced Cyber Attack Landscape” report

Vernot Trojan Avoids Detection by Using Blogging Platform for C&C Communications

Vernot Trojan Avoids Detection by Using Blogging Platform for C&C Communications

Drafts saved on a Japanese service are used for backdoor commands and other tasks

Shakespearian Banking Trojan Shylock Starts Targets New Countries, New Sectors

Shakespearian Banking Trojan Shylock Starts Targets New Countries, New Sectors

Symantec experts have analyzed the latest versions of the malware

Trend Micro Enhances Custom Defense to Identify and Block C&C Communications

Trend Micro Enhances Custom Defense to Identify and Block C&C Communications

The solution will enable enterprises to better protect themselves against APTs

 
Want more? Browse: