Gootkit RAT Using SEO to Distribute Malware Through Compromised Sites
A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware …
A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware …
There was a massive increase in cyber threats globally year-over-year fueled by both the pandemic and expanding attack surfaces, Skybox …
The new version of the trojan targets Windows users using a compiled HTML file format, which initiates the infection chain. This format is …
From the beginning of humanity, scam artists have used emotion to manipulate and exploit their chosen targets. Heightened emotions, like …
What Is a Trojan Horse Virus? It is not what you think, that disguised Trojan Horse, from Greek mythology, that resulted in the fall of the …
Researchers have identified new versions of the Agent Tesla remote access trojan (RAT) that target the Windows anti-malware interface used …
Security researchers are warning of a resurgence of prolific Trojan malware Trickbot, which had its infrastructure disrupted by a …
Just when we thought 2020 couldn’t get worse, security firm FireEye broke the news that the compromise of a software solution by IT …
Cyber threats are constantly evolving. As recently as 2016, Trojan malware accounted for nearly 50% of all …
A wave of attacks against companies in Columbia uses a trio of Remote Access Trojans (RATs) to steal confidential, sensitive data. The …
A North Korean hacking group known as ScarCruft, Reaper and Group123 has been involved in targeting the South Korean government by using a …
Experts spotted the RokRat Trojan being used by North Korea-linked threat actors in attacks aimed at the South Korean government. On …