Supply chain attack via DAEMON Tools
A targeted supply chain attack via popular software for mounting disk images.
16 articles
A targeted supply chain attack via popular software for mounting disk images.
The new CrystalX remote access Trojan looks like the prank viruses of the 90s on the surface, but it causes a lot more damage. It spies on all that’s happening on your computer, steals cryptocurrency and accounts, and gives the attacker full control over your device. We break down how it works, and how to avoid becoming a victim.
How attackers use AI-generated fake websites to distribute trojanized builds of the legitimate Syncro remote access tool (RAT).
We explore how cybercriminals are targeting IT specialists searching for a popular network scanner, using the Interlock ransomware attack as an example.
We’ve discovered a new Trojan that’s very selective about its victims.
Cybercriminals send the Remcos remote-access trojan under the guise of letters from a new client.
Our security technologies detected the exploitation of a previously unknown vulnerability in the Win32k driver.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
Remote Administration Tools in ICS environment are an additional risk factor, and not necessarily a justified one.
At SAS 2016 our GReAT experts talk about a Java-based multi platform malware used by hundreds of cybercriminals for a handful of purposes
If you think that threat isn’t real, ask Miss Teen USA 2013, whose webcam was hacked into and used to take nude photos of her.