Tag Archives: Malwares

Invoice Spam Campaign Drop Banking Trojan

Credit card online

TrendMicro is alerting of a new malware called TROJ_WERDLOD. This is a Trojan horse that is targeting users in Japan. The malware was firstly seen last December 2014 and infected more than 400 machines. This malware is very interesting that

Kjw0rm Hacked French TV5Monde Television

French TV5Monde television network have been under a massive cyber attack with a big damage to their network and facilities. Kjw0rm Variant is a worm that have been used to compromise the TV website, social media accounts and company emails.

A Man Jumped on the Mall is Facebook video scam

facebook-scams

Facebook users should be careful with a new scam that aims to spread malwares, the scam is a fake video hosted on malicious URL. when victim will open the malicious link he will be invited to install an executable file

Malware compromise online payment 2 factor authentication process

New malicious attack have been observed by TrendMicro and targeting Swiss bank customers, Attackers are able to use a sophisticated malware that intercept SMS tokens and change domain name configuration to redirect victims to non legitimate website. This to allow

Process Hacker 2.32 – Utility to manage Windows process and services

Process hacker is one of the leading tool for manipulating processes and services, this is important for monitoring the changes when you are investigating a malicious code. you will need this tool in your sandbox to identify any new process

Network Security vs. Endpoint Security: Which Matters More?

cyber security

_Cyber attacks affect 556 million victims per year, which amounts to 1.5 million victims per day and 18 victims per second. When funds are illegally stolen from a business or personal bank account, they’re only recoverable 22 percent of the

Beware of the Disassembled Malware Emails

Security software company Symantec is alerting of a new malware that is using a disassembled malicious file to evade antimalware protection. Cybercriminals have created a hidden .dat files attached to the email with a shortcut used to reassemble the malware.