January 14, 2020

ISO Files Are Being Used To Deliver Malware

Researchers at Trustwave have observed a notable increase in the use of .ISO files to deliver malware. Hackers have relied on poisoned disk image files for years to deliver malware to their targets. It makes sense in a Windows environment […]
November 22, 2019

Hackers Are Imitating Government Agencies To Spread Malware

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian Revenue Agency, the German Federal Ministry of Finance, […]
November 9, 2019

Some iOS Apps Found To Have Clicker Trojan Malware

Recently, a survey of Apple’s App Store by Wandera Threat Lab discovered more than a dozen iOS apps that have been infected with the ‘Clicker’ Trojan malware.  As malware goes, this variant isn’t especially dangerous to those who wind up […]
November 4, 2019

Backdoor Could Be Used On Microsoft SQL Without Detection

If you haven’t heard of Skip-2.0 yet, prepare to be dismayed. Security researchers have recently discovered an undocumented (until now) backdoor designed for Microsoft SQL servers. It will allow a hacker working remotely to stealthily take control of a previously […]
October 8, 2019

New Exploit Discovered That Adds Malware To Advertisements

Hackers and scammers have a new tool in their toolbox, and they’re making rapid use of it.  Recently, researchers from Confiant have discovered a new campaign involving a Chrome for iOS exploit. They discovered  an unknown group of attackers getting […]
April 6, 2019

Hundreds Of Apps Loaded Adware Onto Millions Of Android Phones

How many malicious apps would you need on the Google Play Store to infect more than one hundred and fifty million Android devices? Unfortunately, we have a good answer to that question, courtesy of SimBad adware, which can be found […]
March 8, 2019

Hackers Find Ways To Run Malware EXE Files On MacOS

In 2015, macOS Security Expert Patrick Wardle reported an almost shockingly simple method hackers could employ to get around the Mac Gatekeeper system, which is the first line of defense against malware. He simply bundled two executable files: One signed and […]