Operators behind the Grandoreiro banking trojan, which is popular in Latin America, have been using emails posing as the Agencia Tributaria to trick victims into installing the malware. The campaign…
The botnet uses proprietary software written from scratch to infect servers and corral them into a peer-to-peer network. Peer-to-peer (P2P) botnets distribute their administration among many infected nodes rather than…
Google will subject Chrome users to a large-scale test in the next version of its browser to discover how people respond to just seeing a site's domain name without the…
Fighting off a ransomware attack doesn't end up with having proper backups. Trend now changed a lot University of Utah revealed it paid $457,059 to a ransomware gang, despite successfully…
Many Advanced Persistent Threat (APT) groups receive guidance and support from established nation-states. Unlike most threat actors, APT attackers chase their goals for months or even years with a clear…
The frequent targeting of cloud and container environments are indicative of a vast attack surface for cybercriminals. Recently, Cado Security researchers have found a first-ever crypto-mining worm dubbed ‘TeamTNT’ containing…
Launching DDoS attacks against dark web sites could soon be a little more difficult to pull off now Tor Project is preparing to fix a bug that has been abused…
Recent espionage campaign targetting government authorities of India , Afganistan and other Asian countries . As named as Transparent tribe originally in operation form 2013 also called as ProjectM Transparent…