They were still Excel documents. Just not your typical Excel files. Enough to trick some security systems, though. …read more Source:: Open Source S
Tag: malware
New Python-scripted trojan malware targets fintech companies
by
•PyVil RAT is capable of keylogging, taking screenshots and more – and the those behind it have gone to great lengths to keep it as under the radar as possible. …read more Source:: Open Source S
Google Play apps promised free shoes, but users got ad fraud malware instead
by
•White Ops discovers a collection of Android apps that installed a hidden browser to load ad-heavy pages and commit ad fraud. …read more Source:: Open Source S
Mac malware spreads through Xcode projects, abuses WebKit, Data Vault vulnerabilities
by
•XCSSET malware focuses on exploiting Safari and other browsers. …read more Source:: Open Source S
Microsoft Edge is malware, says angry Windows 7 user
by
•Microsoft has shown old-fashioned aggression in trying to get Windows 10 users to adopt its new browser. Now, even Windows 7 users are finding it a little much. …read more Source:: Open Source S
Author of FastPOS malware revealed, pleads guilty
by
•A 30-year-old Moldovan man admitted this month to creating the FastPOS malware. …read more Source:: Open Source S
Russian hackers are targeting coronavirus scientists with phishing and malware attacks
by
•Advisory from the UK’s National Cyber Security Centre warns of an active spear-phishing campaign going from APT 29 – a hacking group associated with Russian intelligence services – in an …read more Source:: Open Source S
Microsoft’s new KDP tech blocks malware by making parts of the Windows kernel read-only
by
•New KDP security feature is currently being tested with Windows 10 Insider builds. …read more Source:: Open Source S
Docker servers infected with DDoS malware in extremely rare attacks
by
•Most Docker servers are usually infected with cryptocurrency-mining malware. …read more Source:: Open Source S
Ransomware: Hackers took just three days to find this fake industrial network and fill it with malware
by
•Researchers set up a tempting honeypot to monitor how cyber criminals would exploit it. Then it came under attack. …read more Source:: Open Source S