Tag: Malware
-
Malware Command and Control Without HTTP
Malware frequently uses HTTP for communication, but it’s not the only option. Neither is TCP the only IP protocol we can …
-
Open Redis Servers Infected with Malware
After scanning 72,000 publicly available Redis (REmote DIctionary Server) servers with attack keys garnered through honeypot traffic, …
-
Virtru secures $37 million Series B led by Iconiq
Virtru, the security startup that came out of research at the NSA, announced a $37 million Series B financing round today led by Iconiq …
-
A Look at Java Cryptography
Java Cryptographic Architecture (JCA) has been designed to allow for the creation of protocols such as encryption, hashing, cryptography, …
-
Trojan Teamwork: IcedID and TrickBot in “Unusual” Collaboration
The operators of the “IcedID” and “TrickBot” banking Trojans have teamed up and are likely sharing profits, Flashpoint reported …
-
Trojan Teamwork: “IcedID” and “TrickBot” Dividing Spoils in “Unusual” Collaboration
The operators of the “IcedID” and “TrickBot” banking Trojans have teamed up and are likely sharing profits, Flashpoint reported …
-
FBI issues alert over two new malware linked to Hidden Cobra hackers
The US-CERT has released a joint technical alert from the DHS and the FBI, warning about two newly identified malware being used by the …
-
Security alert: FBI warns of password-stealing North Korean malware
US authorities have provided more details of two pieces of malware which, they said, are used by North Korean hackers to infiltrate …
-
DHS, FBI warn about malware tied to North Korean threat actor
US-CERT has released a new technical alert on malware used by Hidden Cobra, a threat actor whose activities they believe to be directed by …
-
Cryptomining dominates mobile threat landscape
14 mins ago Threat actors are increasingly looking to exploit the popularity and volatility of cryptocurrency in their attacks on mobile …
-
Trojan BackSwap Raises New Risks Across Banking Systems
Security researchers at ESET have identified a new banking Trojan called ‘BackSwap’ which uses “never seen before” techniques to …
-
New Banking Trojan MnuBot uses SQL Server for Command and Control
Researchers at IBM X-Force Research team discovered a new Delphi-based banking Trojan dubbed MnuBot that leverages Microsoft SQL Server …
●●●