The TrickBot authors continue to target various financial institutions across the world, using MS17-010 exploits in an attempt to successfully laterally move throughout a victim’s network…
Phorpiex as a malware family has been around for several years and hasn’t changed much in purpose, functionality, or code…
Cyber criminals are targeting victims with a two-pronged attack that secretly infiltrates systems with data-stealing malware, before dropping ransomware onto the infected system.
The distributed database created by blockchain technology has a fundamentally different digital backbone. This is also the most distinct and important feature of blockchain technology.
It might seem like a concept born from Altered Carbon’s stack technologies, but according to cyber-security firm Kaspersky Lab and the University of Oxford Functional Neurosurgery Group, cyber-attacks might not always be limited to the physical when it comes to our health.
Triton targets the industrial control systems made by Schneider Electric which are used in 18,000 different plants around the world.
The attack targeted the computer’s UEFI, which stands for Unified Extensible Firmware Interface, and is used to boot up the system. By re-writing the UEFI, the malware can persist inside the computer’s flash memory, allowing it to survive operating system re-installs and hard disk replacements.
Park worked under titles of “developer” and “online game developer,” listing the ability to code in Java, JSP, PHP, Flash, but also Visual C++, the language in which most Lazarus Group malware was written in.
Malware threats come without warning and can wreak havoc on an environment. If a user’s device or information is compromised, he or she may have to wait for IT to rectify the issue. Part of the waiting process is determining which type of threat is causing harm.
Android.Banker.L — combines the functionality of banking Trojans, keyloggers and ransomware to compromise victim devices and steal data. As reported by Quick Heal, the latest…