XcodeSpy new malicious project against MacOS
We recently learned of an Xcode project with Trojans in the wild targeting iOS developers thanks to a tip from an anonymous researcher. The malicious project is a doctored version…
Cloud Server and Hosting Tutorials, News and Tricks
We recently learned of an Xcode project with Trojans in the wild targeting iOS developers thanks to a tip from an anonymous researcher. The malicious project is a doctored version…
Quite often, cybercriminals launch attacks against specific targets. In the case of the threat N3TW0RM Ransomware has targeted Israel, where they have launched waves of attacks on computers inside Israeli…
A banking Trojan is a type of malware that installs itself on the mobile device and uses certain techniques to steal money from users’ credit cards. Recent versions of Asacub…
Although this name is also used to refer to a type of malware, originally the RAT (Remote Administration Tool) was created with a good purpose: to help remotely manage configurations…
Rootkits are malicious tools designed to evade detection by burying deep into the operating system and used by attackers to take full control of infected systems avoiding detection and it…
After the controversial decision to radically change the focus of its CentOS distribution, ceasing to support its latest version, and replacing it with ‘CentOS Stream’, a ‘rolling release’ distribution. That…
Slowloris is a type of denial of service attack tool that allows a single machine to kill another machine’s web server with minimal bandwidth and side effects on unrelated services…
An amplification denial-of-service attack is an attack that exploits a server offering a service, such as DNS or NTP, to attack another victim server. The principle is simple: the attacker…
Remote Desktop Protocol or RDP is a network communication protocol designed to allow remote administration of Windows workstations or servers. In principle, it is designed to operate over an encrypted…
Trend Micro researchers have discovered a new variant of the cryptocurrency thief that uses a fileless approach in its global spam distribution campaign to evade detection. Dubbed PandaStealer, Trend Micro…