57% increase in Backoff malware from August to September
Damballa released a new report highlighting the extent to which malware infections, such as Backoff malware, are able to bypass network prevention controls. The report reveals …
Ebola-themed emails deliver malware, exploit Sandworm vulnerability
US CERT has recently issued a warning about malware-delivery campaigns using users’ fear of the Ebola virus and its spreading as a bait. One of the most prolific …
Widespread malvertising campaign targets high-profile sites, delivers ransomware
A newer version of the Cryptowall ransomware has been delivered to unsuspecting Internet users via malicious ads shown on a considerable number of high-profile websites, …
Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics
In a recently released whitepaper, Trend Micro researchers have shared many details about a long-standing economic and political cyber-espionage operation they dubbed Pawn …
Two exploit kits prey on Flash Player flaw patched only last week
Two exploit kits have been outfitted with the exploit for a Flash Player vulnerability that has been patched only a week ago, the researcher that goes by the handle Kafeine …
Attackers change home routers’ DNS settings via malicious code injected in ads
Sucuri Security researchers have unearthed a malvertising campaign aimed at changing the DNS settings of home routers in order to lead users questionable and potentially …
Koler worm spreads via SMS, holds phones for ransom
A new variant of the Android malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid. AdaptiveMobile detected the …
60% of Android attacks use financial malware
Malicious programs targeting Android-based devices in order to steal money were used in 60 percent of attempted attacks registered by Kaspersky Lab security products, …
Malware directs stolen documents to Google Drive
Researchers have uncovered a new type of information-stealing malware that is apparently used in campaigns targeting government agencies and can syphon files from compromised …
Delivering malicious Android apps hidden in image files
Researchers have found a way to deliver a malicious app to Android users by hiding it into what seems to be an encrypted image file, which is then delivered via a legitimate, …
Infographic: A brief history of malware
From simple disk-to-disk attacks in the 80s to email viruses in the modern day, malware is here to stay. This ESET infographic offers you insight about the origins and …
Beware of Ebola-themed phishing, malware campaigns and hoaxes
US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme. “Phishing emails may contain links that direct …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)