Cyber espionage campaign in the Middle East
Kaspersky Lab researchers announced the results of a joint-investigation with Seculert regarding Madi, an active cyber-espionage campaign targeting victims in the Middle East. …
Panda Cloud Antivirus 2.0 released
Panda Security launched Panda Cloud Antivirus 2.0 for both its Free and Pro editions. The new version is fully compatible with Windows 8 Release Preview and incorporates a new …
Norman updates Malware Analyzer G2 platform
Norman announced the new version of its Malware Analyzer G2 platform which delivers to analysts the latest automated analysis tools. Malware Analyzer G2 Version 3 delivers: …
Scareware targets users infected with industrial espionage worm
ACAD/Medre.A, a worm that steals AutoCAD drawings and sends them to remote servers, was recently discovered infecting a great number of computers in Peru and some other Latin …
Big brands utilized in malware distribution
Commtouch security analysts have seen substantial continued blending of big brand names with malware. Researchers named the following top seven brands that were abused in …
Majority of small businesses not confident in network security
More than half of IT administrators at small businesses would not bet their own money that all of the computers their business owns and employees use are free of malware (51%) …
The use of exploit kits changed spam runs
Spammers used to depend on email recipients to tie the noose around their own necks by inputing their personal and financial information in credible spoofs of legitimate …
DarkComet RAT used by wide array of attackers
Remote administration software such as the DarkComet RAT has many legal uses but it is unfortunately more known for being frequently misused by a wide array of cyber …
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …
Microsoft revokes 28 of its code-signing certificates
The long awaited patch for the CVE-2012-1889 vulnerability that has been heavily exploited in the wild and the exploit for which has even been included in the Blackhole …
Trojan found being offered on Google Play for weeks
Symantec researchers have recently discovered Android malware being offered on Google Play, posing as legitimate game apps “Super Mario Bros.” and “GTA 3 …
Targeted attacks focus on small businesses
36 percent of all targeted attacks (58 per day) during the last six months were directed at businesses with 250 or fewer employees, according to Symantec. During the first …
Featured news
Sponsored
Don't miss
- Ransom recovery costs reach $2.73 million
- What is cybersecurity mesh architecture (CSMA)?
- New SOHO router malware aims for cloud accounts, internal company resources
- Dropbox says attackers accessed customer and MFA info, API keys
- 2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element