U.S. businesses are losing millions in fraudulent wire transfers that have their root in email compromises of accounts belonging to top executives.
Tag Archives: Malware
AutoIt Used in Targeted Attacks to Move RATs
Researchers at Cisco spotted targeted attacks moving remote access Trojans via the AutoIt administration and scripting tool.
LNK Files – Shortcuts to Faster Infections
Your Windows desktop is probably full of them, desktop Icons with shortcuts to your applications and folders. They allow you to conveniently access your most used applications and folders on a daily basis.
The post LNK Files – Shortcuts to Faster Infections appeared first on Avira Blog.
Court Rules FTC Has Authority to Punish Wyndham Over Breaches
In the latest installment of a long and winding court case related to multiple data beaches at Wyndham Worldwide several years ago, an appellate court has upheld the authority of the Federal Trade Commission to punish the hotel chain for lax security practices that allegedly led to the breaches. The decision by the United States Court of […]
AlienSpy RAT Resurfaces as JSocket
The dismantled AlientSpy remote access Trojan, the same malware found on the phone of dead Argentine prosecutor Alberto Nisman, has resurfaced with new crypto and a new name.
WordPress Compromises Behind Spike in Neutrino EK Traffic
A rash of compromised WordPress websites is behind this week’s surge in Neutrino Exploit Kit traffic
Analysis of a Spam Mail
Spamming is a big and a nasty problem in our online world, every day. Each and every one of you probably had this one mail in your inbox. The mail where you didn’t know if you could open it because it might contain a dangerous attachment, or the one where you were just really annoyed by the nonsense content. I guess that we can all agree: nobody wants that.
The post Analysis of a Spam Mail appeared first on Avira Blog.
Analysis of a Spam Mail
Spamming is a big and a nasty problem in our online world, every day. Each and every one of you probably had this one mail in your inbox. The mail where you didn’t know if you could open it because it might contain a dangerous attachment, or the one where you were just really annoyed by the nonsense content. I guess that we can all agree: nobody wants that.
The post Analysis of a Spam Mail appeared first on Avira Blog.
Facebook Updates Information-Sharing Platform
Facebook announced that its ThreatExchange information-sharing platform is closing in on 100 participants and has streamlined its application process.
Uptick in Neutrino Exploit Kit Traffic Doesn’t Mean Angler Reign Over
A SANS ISC report indicates a prominent cybercrime group has begun using the Neutrino Exploit Kit, but that hardly spells the end of the road for the notorious Angler EK.