Cyber Security
Security teams have a new tool to hunt for malware, using open source YARA rules. YARAify can scan files using public YARA rules, integrate public...
Hi, what are you looking for?
Security teams have a new tool to hunt for malware, using open source YARA rules. YARAify can scan files using public YARA rules, integrate public...
The threat actor behind BRATA banking trojan has evolved their tactics and improved the malware with information-stealing capabilities. Italian mobile security company Cleafy has been tracking BRATA...
Security researchers have noticed a new malicious spam campaign that delivers the ‘Matanbuchus’ malware to drop Cobalt Strike beacons on compromised machines. Cobalt Strike...
PyPI packages ‘keep,’ ‘pyanxdns,’ ‘api-res-py’ were found to be containing a backdoor due to the presence of malicious ‘request’ dependency within some versions. For example, while most versions...
The Iranian Lycaeum APT hacking group uses a new .NET-based DNS backdoor to conduct attacks on companies in the energy and telecommunication sectors. Lyceum...
Security researchers are warning of an Android malware named SMSFactory that adds unwanted costs to the phone bill by subscribing victims to premium services. The...
Kaspersky’s quarterly report on mobile malware distribution notes a downward trend that started in late 2020. Despite the overall demise in malware volumes, the security company...
Ransomware attacks were up 13% in the last 12 months, representing a greater increase than the last five years combined, according to the latest...
Threat analysts have discovered a recent malware distribution campaign using PDF attachments to smuggle malicious Word documents that infect users with malware. The choice...
A report from the UK government has laid bare the risks of malicious mobile apps, as lawmakers call for tougher protections for consumers. The report (PDF),...