Twitoor First Android Twitter-based Botnet

Twitoor

Security researchers at ESET uncovered the first android based botnet Twitoor, the communication in this botnet is using Twitter accounts.

APT2 – Automated Penetration Testing Toolkit

APT2 is an automated pentest tool that you can use to exploit a vulnerability already discovered by scanners.

Pokemon GO Android App Found Shipped with Malware

Over this week security researchers at Dell have identified another fake Pokemon GO application. This time cybercriminals taking advantage that the game is not available for all countries in the world but some particular countries controlled over the appstore and

AdGholas Malvertising Campaigns Infect Thousands of Users Daily

Security researchers at proofpoint have alerted of a malicious campaigns AdGholas which uses sophisticated techniques. This made the cyber-attack stay hidden for months and served to infiltrate millions of computers.

EmPyre – post-exploitation OS X/Linux agent

EmPyre - RAT (Remote Access Trojan) EmPyre is a pure Python post-exploitation agent built on cryptologically-secure communications and a flexible architecture.

AVG Released Bart Ransomware Decryptor

Security Software Company AVG released a new free utility to recover files encrypted with Bart ransomware, Bart is a new malware that was initially discovered on June, this was sent using spam messages by Necurs botnet.

Google Chrome Extension Hijack Facebook Accounts

Chrome extension that can be used by cyber criminal to Hijack Facebook Accounts and launch DDoS attacks or steal victim passwords and more.