Zeljka Zorz
Zbot acquires file infection feature
A Zbot Trojan variant that has the ability to infect other files has been discovered recently. It searches for .exe files in predefined places and injects into them 512 bytes …
Spying the spy: How to turn Trojans against criminals
“Researchers do vulnerability research on so many various application, why not to do it on this one?” asked himself Andrzej Dereszowski, founder and director of …
So, you bought a fake AV. What happens next?
A Sunbelt researcher has had the “fortune” of having a relative fall for the scam, which gave him the opportunity to take a peak at the process following the …
Escalation of pharma spam from Gmail accounts
A recent noticeable upsurge of spam massages coming from compromised Gmail accounts has led the unfortunate victims to speculate that there is a bug in the Gmail mobile …
Google shines a light on government requests
Among all the search engines and ISPs around the world, Google has taken the first step towards transparency when they revealed their Government Requests tool on Tuesday: …
Fake AV doorway pages in the spotlight
Fake AV has become a regular fixture of the threat landscape for quite some time now, and TrendLabs experts take a closer look at the different tactics employed on the …
Google attack objective: Source code for the single sign-on system?
The January attacks on Google and other US companies may seem to us as if they have happened ages ago, but you can be sure that they are still actively involved in the …
Phishing student loans’ pages target students
University students in the UK that have taken out a loan with the Student Loans Company have lately been targeted by a phishing scam that presents to them a page that is …
Network Solutions customers targeted by new hack attack
Only a week after a number of blogs hosted on Network Solutions have been compromised thanks to a WordPress hack, the company has been thrust back into the spotlight by a …
Iceland volcano search results lead to fake AV
Eyjafj?¶ll, Eyjafjallaj?¶kull, Eyjafjalla, Eyjafjallajokull-¦ The Iceland volcano Eyjafjallaj?¶kull has been recently referred to by all those names in various media, …
Trojan disguised as Google Chrome extension
The announcement that Google Chrome is now the third most widely used browser wasn’t lost on cybercriminals. They follow the crowd, and that explains the recent …
Featured news
Resources
Don't miss
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028