The findings come from Trend Micro following an investigation into a number of intrusions in the Middle East that culminated… Read More
It provides threat actors with an initial foothold that can be used to facilitate further compromise or other malware infections… Read More
The TA505 cybercrime group is upping its financially motivated attacks, shooting malware at a range of industries in a wave… Read More
Kaspersky provided a detailed technical analysis of QakBot, a decade-old Trojan that is active since 2007. It also underlines the… Read More
Experts from McAfee Labs warn of a novel technique used by threat actors that are using non-malicious documents to disable… Read More
Phishing attacks masquerading as QuickBooks invoices are targeting users of the popular accounting software in an attempt to infect victim’s… Read More
Cybercriminals were found shuffling payloads once again. Security analysts reported two banking trojans being used alternatively to deliver various ransomware… Read More
In the first months of the year, researchers noticed a malicious email campaign spreading weaponized Office documents that was delivering… Read More
The malspam emails use a .zipx file attachment, a .zipx file is a ZIP archive compressed using the most recent… Read More
“In Oct the most prevalent secondary payloads were TrickBot, Qakbot and ZLoader now we observed TrickBot,” according to Brad Haas,… Read More