In late 2019, a new strain of malware called “Valak” was detected. In the six months that followed its initial discovery in the wild, more than 30 variants of the code were detected. Initially, Valak was classified as a simple […]
Are you one of the million-plus website owners making use of Ninja Forms for WordPress? If so, be aware that the company has recently patched a serious security flaw that allowed hackers to inject malicious code and take over websites. […]
If you’re like a lot of people stuck at home during the pandemic, you probably ran out of Netflix titles to watch a couple of weeks ago. As a result, researchers have noted a huge surge in traffic to torrent […]
A few new variants of the Agent Tesla info-stealer malware have been spotted in the wild and should be on your radar if they’re not already. The new variants are more dangerous than previous versions of the malware. They now […]
There is no low that hackers and scammers won’t stoop to. The US Federal Trade Commission (FTC) has issued a warning about a worldwide scam in progress relating to fears surrounding the CoronaVirus. The FTC’s announcement speaks for itself. Their […]
There’s a new threat making the rounds called ‘Metamorfo’ that you should be aware of. The malware began its life as a banking trojan. This news is from researchers at Fortinet, who report that the malicious code has recently gotten […]
If you work in the financial sector, be advised that there’s a large scale botnet-driven malware campaign underway. It has been targeting firms in both the US and the UK. The malware at the heart of the campaign is Emotet, […]
It’s easy to get caught up in the hype of popular movies. Hackers know this and are beginning to incorporate Oscar Nominated movies into their strategies. They’re using enticing images to bait unsuspecting users to install malware and lure them […]
If you haven’t yet heard of a malware strain called ‘Predator the Thief’, it’s something that belongs on your radar. It first emerged as a threat in July of 2018, when it was used in conjunction with an extensive phishing […]