Malware typically refers to malicious software comprised of worms, viruses, Trojans, and several other harmful programs. Hackers and spammers use Malware to damage your data and gain access to your confidential...
Microsoft has continued its analysis of the LemonDuck coin-mining malware which has been crafted by some very determined, financially motivated cybercriminals. LemonDuck is known for install...
Windows internet-facing servers are being targeted by a new threat actor found by the Sygnia Incident Response team. The advanced and persistent threat which they call the ‘Praying Mantis’ is operating almost c...
Microsoft is warning users to watch out for a new form of malware that is capable of stealing passwords, webcam, and browser data. A remote access tool (RAT), being referred to as RevenageRAT has been flagged b...
Password Stealing Android malware is spreading quickly that people need to know about. FluBot is designed to steal personal information including bank details – and infected users are being exploited to s...
Ran into a new malware that destroys infected systems, either by wiping files or rewriting a computer’s master boot record (MBR). This is a bad one and everyone has to be careful with they are clicking a...
More than 20 municipalities in the US have been hit by ransomware attacks this year alone, the software has grown rapidly by an internet worm that spreads copies of itself by hacking into other computers on a n...
This malware family refers to variants consisting of backdoors that are tied to the ANDROMEDA botnet. The botnet was first spotted in late 2011. Law enforcement has dismantled the Andromeda malware family, whic...
On average, organizations take about 200 days to identify new ransomware threats. In combination with aging hardware, out of date software, poor network monitoring, and lack of professional IT assistance, this ...
New Android Trojan virus reported by Kaspersky Lab, that goes by the name, Switcher. Switcher Trojan infects wifi routers through an infected Android, where an attacker can then reroute other users on the netwo...