- Security Blog
- By Ionut Ilascu
- August 29th, 2014
Bifrose Backdoor Variant Uses Tor, May Work Against It
This Bifrose can do more than just record activity on the affected system
- Security
- By Ionut Ilascu
- August 25th, 2014
Kelihos Trojan Delivered as Tool to Attack US Government Websites
Cybercriminals do not have to hide the executable nature of the downloaded file
- Security
- By Ionut Ilascu
- August 25th, 2014
Carbon Grabber Malware Hits Automobile Businesses in Europe
Works with the most popular web browsers, injects code in Microsoft Outlook
- Security
- By Ionut Ilascu
- August 18th, 2014
Over 10,000 Fall Victim to Intensified Cyber Attacks Targeting Syria
Threat actors are more organized and started using more complex malware
- Security
- By Ionut Ilascu
- August 14th, 2014
New Gameover Zeus Botnet Forming, the US Sees Most Infections
Almost half of the infected machines are located in the United States
- Security Blog
- By Ionut Ilascu
- August 14th, 2014
Boleto Malware Borrows Evasion Techniques from Zeus Trojan
Payloads are slipped into the system without alerting defense mechanisms
- Security
- By Ionut Ilascu
- August 12th, 2014
New Android Malware Krysanec Infects Legitimate Apps
The Trojan deceives the user by impersonating legitimate applications
- Security Blog
- By Ionut Ilascu
- August 8th, 2014
Researcher Grabs Scammer’s Picture with His Own Camera
Zeus Trojan's protection mechanism bypassed using publicly available hacking tools
- Security
- By Ionut Ilascu
- August 8th, 2014
Romanian Government Sites Most Used in Turla Watering Hole Attacks
Websites were probably compromised due to vulnerability in the CMS platform
- Security
- By Ionut Ilascu
- August 8th, 2014
Turla Espionage Trojan Uses Reconnaisance Backdoor, Is Selective About Victims
Operators rely on multi-stage infection strategy to spy on the right individuals
- Security
- By Ionut Ilascu
- August 1st, 2014
New Gameover ZeuS Variant and Shylock Rebuild Botnets
Almost 10,000 bots attempt to contact security firm sinkhole
- Security
- By Ionut Ilascu
- July 26th, 2014
New Trojan Infiltrates Korean Organization
Identifying the threat actor proves to be quite difficult
- Security
- By Ionut Ilascu
- July 22nd, 2014
Simplocker Crypto-Malware Now Locks Backup Files, Targets Larger Audience
Crypto-malware starts to evolve and seeks English-speaking victims
- Security
- By Ionut Ilascu
- July 21st, 2014
Facebook Scam Redirects to Fake YouTube Page
Crooks created thousands of URLs that redirect to malicious pages
- Security
- By Ionut Ilascu
- July 18th, 2014
Tinybanker Trojan Hits Czech Republic
Banking malware Trojan delivered through fake debt notifications
- Security
- By Ionut Ilascu
- July 18th, 2014
Android Malware Aggressive on Getting Admin Privileges
Includes the capability to intercept and send messages
- Security
- By Ionut Ilascu
- July 17th, 2014
Neverquest Banking Trojan Expands List of Targets
More than 50 United States banks are listed in the Trojan’s configuration file