Cyberattackers Serve Up Custom Backdoor for Oracle Restaurant Software
The modular malware is highly sophisticated but may not be able to capture credit-card info.
Read MoreThe modular malware is highly sophisticated but may not be able to capture credit-card info.
Read MoreMicrosoft and partners went after the botnet using a copyright infringement tactic and hunting down C2 servers.
Read MoreEleven different malware families are coordinating on distribution, features, geo-targeting and more.
Read MoreThe Linux-targeted code can steal phone-call metadata, likely in spy campaigns or for use in VoIP fraud.
Read MoreKryptoCibule spreads via pirated software and game torrents.
Read MoreThe CryCryptor malware strain is a brand-new family of threats, leveraging COVID-19 to spread.
Read MoreInvisiMole is back, targeting Eastern Europe organizations in the military sector and diplomatic missions with an updated toolset and new APT partnership.
Read MoreAn updated version of the ComRAT malware was discovered in attacks on governmental targets.
Read MoreThe cyber-espionage toolkit is under active development.
Read MoreThe cyber-espionage toolkit is under active development.
Read MoreBy continuing to use the site, you agree to the use of cookies. more information
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.