Nephilim Ransomware targets wealthy companies
Ransomware attacks are one of the most damaging threats to organizations, both in operational, economic and reputational terms, and in recent years their strategies have evolved to obtain greater benefits…
LockBit – A constantly evolving ransomware
Discovered by MalwareHunterTeam, LockBit is a ransomware. Malicious software under this classification is designed to encrypt data. Cyber criminals behind the infection demand payment for decryption tools / software. During…
Identd is a protocol that helps to identify the user
An identification or Identd protocol, also called a user authentication protocol, is an interactive protocol that allows one party to prove their identity to another party. The part that is…
JSSLoader – A Threat That Comes Back Improved
Code refactoring is a popular technique that software developers use to, in simple terms, modify the internal structure of their program without changing its behavior at all. Malware developers also…
Meow threat not as friendly as its name
Some may already know it and others do not but today we come to talk about Meow which is well remembered for deleting thousands of databases connected to the Internet…
Diavol – A diabolical ransomware from Wizard Spider
Researchers from the cybersecurity company FortiGuard Labs (a Fortinet firm) have linked a new ransomware campaign called Diavol and it is that this malware seems to be signed by one…
ArnoldC For Arnold Schwarzenegger Lovers
If programming bores you, maybe it is because you have not found the right programming language and ArnoldC may meet those criteria since it works, literally, with phrases from movies…
XSS Attacks – A fairly common threat
XSS occurs when an attacker is able to inject a script, usually Javascript, into the output of a web application so that it runs in the client’s browser. The attacks…
SIP Protocol and how it works?
The Session Initiation Protocol (SIP) is basically in charge of establishing communication between two devices. More technically speaking, it is an open signaling protocol used to establish, modify and terminate…
Shellbot Malware used to mine cryptocurrencies
As we can well agree, Shellbot made its appearance in 2005, at that time Shellbot was able to brutally force the credentials of SSH remote access services on Linux servers…