CyberStalkers – Risks and problems these brings to us
Social networks are tools that promote contact between individuals from all parts of the world. However, it is more and…
STRRAT New malicious campaign lurking on the Net
Researchers at Microsoft Security Intelligence discovered a malware campaign that is spreading a Remote Access Trojan (RAT) registered as STRRAT.…
AHK, the new malicious RAT distribution campaign
An ongoing malware campaign has been discovered that uses the AutoHotkey (AHK) scripting language to deliver multiple RATs, such as…
APT – A potentially harmful cyberattack method
Cybercriminals are putting more and more effort and creativity into carrying out attacks. Therefore, they prefer much more attractive targets…
FriarFox threat that targets Gmail accounts
A newly discovered cyberattack is taking control of victims’ Gmail accounts by using a malicious and custom Mozilla Firefox browser…
Tox is a tool used to create ransomware
Tox is a kit for creating ransomware viruses therefore almost anyone can generate a fully functional ransomware infection. The worst…
Kodachi – A very good security distro
Operating systems, web browsers, and even our Internet provider are constantly monitoring our activity. The companies behind it often collect…
GenRx and how a pharmaceutical company gets attacked
A major cyberattack that hit the US pharmacy GenRx potentially resulted in a data breach. The incident affected hundreds of…
Phorpiex, an ancient threat that resurfaces again
Cybersecurity researchers have discovered that a decade-old botnet has a new feature that allows it to send millions of phishing…
Blind SQL Injection – A variant of SQL injection
SQL, which have been around for a long time. Today, they continue to be widely used by cybercriminals. The purpose…

