Fake Chinese Ministry of Defense Emails Used in Attacks on Asian and European Governments

Fake Chinese Ministry of Defense Emails Used in Attacks on Asian and European Governments

16 European officials have received the malicious messages

Experts Warn of Unpatched Backdoor in Atlassian Crowd Authentication Service

Experts Warn of Unpatched Backdoor in Atlassian Crowd Authentication Service

The vulnerability can be exploited to compromise credentials

Expert Identifies Backdoor in HP’s StoreOnce Backup System (Updated)

Expert Identifies Backdoor in HP’s StoreOnce Backup System (Updated)

The researcher is unhappy that HP hasn't addressed the issue

Trojan Uses Fake Adobe Certificate to Evade Detection

Trojan Uses Fake Adobe Certificate to Evade Detection

Symantec experts have analyzed an interesting variant of Backdoor.Trojan

German Users Targeted with Malware Capable of Wiping MBR

German Users Targeted with Malware Capable of Wiping MBR

Trend Micro has analyzed an interesting backdoor malware

Winnti Backdoor Created with Aheadlib to Mimic Legitimate System Library

Winnti Backdoor Created with Aheadlib to Mimic Legitimate System Library

Trend Micro experts have analyzed this interesting threat

Sophisticated Apache Backdoor Used to Drive Traffic to Malicious Websites

Sophisticated Apache Backdoor Used to Drive Traffic to Malicious Websites

Sucuri and ESET experts have analyzed this threat

Vernot Trojan Avoids Detection by Using Blogging Platform for C&C Communications

Vernot Trojan Avoids Detection by Using Blogging Platform for C&C Communications

Drafts saved on a Japanese service are used for backdoor commands and other tasks

Former Hostgator Employee Accused of Installing Backdoors on Over 2,700 Servers

Former Hostgator Employee Accused of Installing Backdoors on Over 2,700 Servers

The malicious apps were discovered after the suspect was terminated

New Trojan Bypasses OS X Gatekeeper

New Trojan Bypasses OS X Gatekeeper

The same piece of malware was recently used to hack Apple, Twitter, and Microsoft

ACH Scam Alert: Transaction Is Completed

ACH Scam Alert: Transaction Is Completed

The malicious emails are designed to distribute Backdoor.Agent

Frutas: Java-Based Cross-Platform RAT

Frutas: Java-Based Cross-Platform RAT

Symantec experts have analyzed the tool that is mainly used by Spanish hackers

Malware Alert: 2010 and 2011 Tax Documents, Accountant's Letter

Malware Alert: 2010 and 2011 Tax Documents, Accountant's Letter

Sophos experts have examined this latest spam run

At Least 12 Organizations from Aerospace and Defense Industry Targeted by Hackers

At Least 12 Organizations from Aerospace and Defense Industry Targeted by Hackers

The malware used in this campaign is identified by Symantec as Backdoor.Barikiofork

Hackers Hide Backdoor Malware in Fake “Java Update 11”

Hackers Hide Backdoor Malware in Fake “Java Update 11”

Trend Micro experts have analyzed the malicious element

Exforel Backdoor Implemented at NDIS Level to Be More Stealthy

Exforel Backdoor Implemented at NDIS Level to Be More Stealthy

Microsoft Malware Protection Center researchers have analyzed the threat

Hackers Target NATO with Hurricane Sandy Emails

Hackers Target NATO with Hurricane Sandy Emails

A malicious document was sent to NATO Special Operations Headquarters in October

 
Want more? Browse: