Latest Intelligence for February 2017
Number of new malware variants reaches highest level since October 2016 and Symantec uncovers a wider campaign carried out by Shamoon attackers.Read More Continue reading Latest Intelligence for February 2017
Collaborate Disseminate
Number of new malware variants reaches highest level since October 2016 and Symantec uncovers a wider campaign carried out by Shamoon attackers.Read More Continue reading Latest Intelligence for February 2017
Recent attacks involving the destructive malware Shamoon appear to be part of a much wider campaign in the Middle East and beyond.Read More Continue reading Shamoon: Multi-staged destructive attacks limited to specific targets
Recent attacks involving the destructive malware Shamoon appear to be part of a much wider campaign in the Middle East and beyond.Read More Continue reading Shamoon: Multi-staged destructive attacks limited to specific targets
Latest Android.Lockdroid.E variant uses speech recognition instead of typing for unlock code input.Read More Continue reading Android ransomware requires victim to speak unlock code
Cybersecurity consortium formally establishes rapid security intelligence sharing system to combat cybercrime and advanced attacks.Read More Continue reading Symantec and other industry leaders announce expanded Cyber Threat Alliance
Android ransomware is now using dropper techniques to drop malware on rooted devices as well as an inefficient 2D barcode ransom demand.Read More Continue reading Android ransomware repurposes old dropper techniques
Three apps on Google Play use delayed attacks, self-naming tricks, and an attack list dictated by a command and control server to click on ads in the background without the user’s knowledge.Read More Continue reading Android Ad Malware on Google Play Combines Three Deception Techniques
Greenbug may answer the question of how Shamoon obtains the stolen credentials needed to carry out its disk-wiping attacks.Read More Continue reading Greenbug cyberespionage group targeting Middle East, possible links to Shamoon
Greenbug may answer the question of how Shamoon obtains the stolen credentials needed to carry out its disk-wiping attacks.Read More Continue reading Greenbug cyberespionage group targeting Middle East, possible links to Shamoon
Greenbug may answer the question of how Shamoon obtains the stolen credentials needed to carry out its disk-wiping attacks.Read More Continue reading Greenbug cyberespionage group targeting Middle East, possible links to Shamoon