Security Experts:

Virus & Malware
long dotted


Researchers discover a new malware framework that managed to gather over one billion fraudulent ad impressions in the past three months. [Read More]
A recently discovered ongoing campaign attributed to the StrongPity threat actor abuses malicious WinBox installers to infect victims, AT&T’s Alien Labs security researchers reveal. [Read More]
Researchers discover EvilGnome, a new Linux backdoor that helps hackers spy on users. [Read More]
The hackers behind the SLUB backdoor have started abusing a recently patched Internet Explorer vulnerability for distribution purposes. [Read More]
A Nigeria-linked threat actor active since at least 2017 has been targeting manufacturing and logistics organizations around the world with information stealers and RATs. [Read More]
A new DNS-changer Trojan is being used in an adware campaign to prevent users from accessing security-related sites. [Read More]
LaPorte County in Indiana paid a ransom of over $130,000 demanded by cybercriminals who managed to infect its systems with a piece of ransomware. [Read More]
United States Conference of Mayors, which represents over 1,400 mayors from cities with a population of at least 30,000, promises not to pay ransomware demands. [Read More]
Hackers breached the archive server for the Pale Moon open source web browser and infected all .exe files with malware. [Read More]
One of the Windows zero-days patched by Microsoft with its July 2019 updates, CVE-2019-1132, was used by the Buhtrap group to target a government organization in Eastern Europe. [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...