Researchers at Kaspersky Lab today confirmed that the cybercriminals behind the Lurk Trojan were also responsible for the development and distribution of the Angler Exploit Kit
Tag Archives: Malware
OSX/Keydnap spreads via signed Transmission application
During the last hours, OSX/Keydnap was distributed on a trusted website, which turned out to be “something else”. It spread via a recompiled version of the otherwise legitimate open source BitTorrent client application Transmission and distributed on their official website.
The post OSX/Keydnap spreads via signed Transmission application appeared first on WeLiveSecurity.
![]()
Threatpost News Wrap, August 26, 2016
Mike Mimoso and Chris Brook discuss the news of the week, including the latest on ShadowBrokers and Cisco, Sweet32, decryptors for the Wildfire ransomware, and some gaming forum breaches.
Tales from Ransomwhere: Shadow Copies
It is difficult to recover files that were kidnapped by ransomware without paying the criminals. In this new chapter we will clue you in on some tricks.
Apple releases 'Emergency' Patch after Advanced Spyware Targets Human Rights Activist
Apple has released iOS 9.3.5 update for iPhones and iPads to patch three zero-day vulnerabilities after a piece of spyware found targeting the iPhone used by a renowned UAE human rights defender, Ahmed Mansoor.
One of the world’s most invasive software weapon distributors, called the NSO Group, has been exploiting three zero-day security vulnerabilities in order to spy on dissidents and
![]()
First Twitter-controlled Android botnet discovered
Detected by ESET as Android/Twitoor, this malware is unique because of its resilience mechanism. Instead of being controlled by a traditional command-and-control server, it receives instructions via tweets.
The post First Twitter-controlled Android botnet discovered appeared first on WeLiveSecurity.
![]()
Watch out for Chrome and Firefox web extensions that access browser history and rob passwords
Malicious extensions can save and modify permissions, gain access to your browser history, and modify the pages you visit or save the passwords you use.
New Brazilian Banking Trojan Uses Windows PowerShell Utility
A new sophisticated banking Trojan targeting Brazilians via a malicious .PIF file that changes browser proxy settings.
Locky Targets Hospitals In Massive Wave Of Ransomware Attacks
A massive wave of Locky ransomware delivered via DOCM attachments is targeting the healthcare sector this month.
Protect your business from malvertising: stop your employees from clicking malicious ads
Malicious advertisements, called malvertising, are capable of getting into anyone’s computers. Have you been trained on how to prevent these threats in your business environment?
