Tag: Proofpoint
You are here: Home \ Proofpoint
This brand-new RAT represents the latest escalation in an ongoing malware arms race that extends even to commodity malware.
Hundreds of thousands of emails are delivering weaponized PDFs containing malicious SettingContent-ms files.
Defray, a new, although small strain of ransomware, was spotted by researchers targeting comapnies in the education and healthcare verticals.
A new version of the SpyNote Trojan is designed to trick Android users into thinking it’s a legitimate Netflix application.
Developers behind the malicious downloader Hancitor have bolstered the malware again, this time with new delivery approaches that make it more difficult to detect.
Microsoft this week patched a zero-day vulnerability in the Internet Explorer and Edge browsers being used in the AdGholas malvertising campaign.
For over a year attackers were able to carry out a malvertising campaign that managed to draw between one and five million client hits a day, according to researchers. The scam infected thousands a day using a one-two-punch of filtering and steganography, the art of hiding information inside messages or image. The attackers behind the campaign...
Niantic, Inc. – the company behind the ubiquitous, can’t-go-10-minutes-without-hearing-about-it Pokémon GO game – said Monday night it wasn’t the company’s intent to request full access permission of its users’ Google accounts. The company, a Google spinoff, was put in the crosshairs over its security, or lack thereof, earlier this week after it was discovered the app had...
Researchers are warning would-be Pokémon Trainers that a malicious, backdoored version of the massively popular game Pokémon Go could be making the rounds soon. An APK (Android application package file) of the game has been rigged with a remote access tool (RAT) called Droidjack that if installed, could essentially give an attacker complete access to...
Criminal hackers are fickle about their attack vectors. You need to look no further for evidence of this than their constant migration from one exploit kit to another. And while there is an expansive menu of exploit kits, attackers do seem to congregate around a precious few. Researchers who study exploit kits closely, however, are...