Top

Category: Threats & Malware

Threats and Malware


Threats & Malware, Vulnerabilities

Spectre and Meltdown explained: What they are, how they work, what’s at risk

January 15, 2018

Via: CSO Online

In the first days of 2018, published research revealed that nearly every computer chip manufactured in the last 20 years contains fundamental security flaws, with specific variations on those flaws being dubbed Spectre and Meltdown. The flaws arise from features […]


Threats & Malware, Vulnerabilities

Intel: Massive cyber-vulnerability not limited to our chips

January 4, 2018

Via: The Hill

The massive cyber-vulnerability revealed this week in Intel’s chips goes beyond the firm and affects other companies’ chips as well, according to Intel. The chip flaw leaves many computer processors created over the last 10 years, according to some reports, open […]


Cyber-crime, Hacker, Malware, Threats & Malware

Europol releases dramatic video of Romanians arrested for spreading CTB Locker and Cerber ransomware

December 21, 2017

Via: Hot for Security

As part of an extensive law enforcement operation called “Bakovia,” Romanian authorities on Wednesday arrested five individuals suspected of infecting tens of thousands of computers across Europe and the United States using the infamous Ransomware-as-a-Service model leveraging two of the […]


Cyber-crime, Network security, Threats & Malware

Year in Review: How Did the Cyberthreat Landscape Change in 2017?

December 20, 2017

Via: Security Intelligence

The cyberthreat landscape has evolved over time, and 2017 saw an increase in attacks over the 90 million intrusions recorded in 2016. While threats such as ransomware are not new, this year saw a major paradigm shift in which malicious […]


Hacker, Threats & Malware, Vulnerabilities

Microsoft Word slams the door on DDEAUTO malware attacks

December 19, 2017

Via: Naked Security

Remember the DDEAUTO vulnerability? DDEAUTO, short for automatic dynamic data exchange, is a command you can put right inside the data of an Office file to get it to pull data out of another file. According to Microsoft’s official documentation, […]


Malware, Phishing, Threats & Malware

Exploits and fileless malware drive record new malware surge

December 19, 2017

Via: Help Net Security

McAfee released its McAfee Labs Threat Report: December 2017, examining the growth and trends of new malware, ransomware, and other threats in Q3 2017. McAfee Labs saw malware reach an all-time high of 57.6 million new samples – four new […]


Cyber-crime, Security, Threats & Malware

Week in review: Keylogger in HP laptops, ICS-tailored malware, new issue of (IN)SECURE

December 18, 2017

Via: Help Net Security

Here’s an overview of some of last week’s most interesting news and articles: Keylogger found in Synaptics driver on HP laptops For the second time this year, a security researcher unearthed a keylogger in a driver used on a number […]


Malware, Security, Threats & Malware

Expert found critical issues in Palo Alto PAN-OS Networks Security Platform

December 18, 2017

Via: Security Affairs

Last week, Palo Alto Networks released security updates for its PAN-OS security platform that address critical and high severity vulnerabilities that can be exploited by a remote and unauthenticated for remote code execution and command injection. The critical issue, tracked as CVE-2017-15944, […]


Cyber-crime, Malware, Threats & Malware

Cyber experts identify new malware targeting critical infrastructure

December 15, 2017

Via: The Hill

A hacker used a new type of malware targeting industrial control systems against a critical infrastructure organization in an attack that resulted in operations shutting down, according to cybersecurity experts. Cybersecurity firm FireEye, which has dubbed the malware “Triton,” saidThursday that its […]


Malware, Threats & Malware

Kaspersky Security Bulletin: Threat Predictions for 2018

November 17, 2017

Via: Securelist

As hard as it is to believe, it’s once again time for our APT Predictions. Looking back at a year like 2017 brings the internal conflict of being a security researcher into full view: on the one hand, each new […]