The use of exploit kits changed spam runs
Spammers used to depend on email recipients to tie the noose around their own necks by inputing their personal and financial information in credible spoofs of legitimate …
DarkComet RAT used by wide array of attackers
Remote administration software such as the DarkComet RAT has many legal uses but it is unfortunately more known for being frequently misused by a wide array of cyber …
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …
Microsoft revokes 28 of its code-signing certificates
The long awaited patch for the CVE-2012-1889 vulnerability that has been heavily exploited in the wild and the exploit for which has even been included in the Blackhole …
Trojan found being offered on Google Play for weeks
Symantec researchers have recently discovered Android malware being offered on Google Play, posing as legitimate game apps “Super Mario Bros.” and “GTA 3 …
Targeted attacks focus on small businesses
36 percent of all targeted attacks (58 per day) during the last six months were directed at businesses with 250 or fewer employees, according to Symantec. During the first …
Multi-platform backdoor served through compromised website
The compromised website of a Colombian transport company has been found serving a signed Java applet that detects whether the visitor is using a Windows, OS X or Linux machine …
US-based machines preferred by malicious pay-per-install networks
Pay-per-install affiliate networks looking for compromised computers to get their malicious wares installed on have a definitive predilection for machines located in developed …
Android Trojan attacks European banks
Recently Trusteer discovered the first Tatanga-based man in the mobile (MITMO) attack as well as new SPITMO configurations which are targeting Android mobile banking users in …
Websense TRITON now with new malware and data theft defenses
Websense announced 10 new malware and data theft defenses, spear phishing protection with cloud sandboxing, and a forensic reporting dashboard with security intelligence. With …
Bogus reminder about tomorrow’s meeting carries malware
Bogus emails warning users not to forget about a meeting scheduled for the next day have been hitting inboxes and trying to make the recipients download malware, warns Sophos. …
DarkComet RAT author ends the project
The DarkComet remote administration tool, which has recently been misused by the Syrian government to spy on its opponents, has reached the end of the line. “DarkComet …
Featured news
Resources
Don't miss
- Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
- Stealthy attack serves poisoned web pages only to AI agents
- September 2025 Patch Tuesday forecast: The CVE matrix
- Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
- CyberFlex: Flexible Pen testing as a Service with EASM