Malware

Is This The Start Of Open Source Malware for Linux 1

Is This The Start Of Open Source Malware for Linux?

Linux is considered a more secure and privacy-focused operating system than Windows, not only because of a low market share (only 2% of all installed desktop operating system) but also…

Read More
Automated Malware Analysis in the Cloud 1

Automated Malware Analysis in the Cloud

Cybercriminals execute malware attacks using different attack vectors and using different methods. The number of malware strains is increasing in an unprecedented manner and hence malware analysis today is not…

Read More
Open EDR
Law Enforcement Operation Dismantle GozNym Banking Malware

Law Enforcement Operation Dismantles GozNym Banking Malware

An international law enforcement operation has led to the dismantling of the global cybercrime networkcybercrime network that used the GozNym banking malware to steal money from bank accounts across the…

Read More
Laptop Running Six Dangerous Malware up for Auction

Laptop Running Six Most Dangerous Malware up for Auction

This is news! A laptop containing six of the most dangerous of malware created till date is up for auction. A Samsung NC10-14GB 10.2-Inch Blue Netbook, which contains six such…

Read More
Tax System Down To Malware Attack

Wolters Kluwer Cloud Accounting & Tax System Down To Malware Attack

Tax Accounting Firm Wolters Kluwer, valued at $4.8 billion is currently suffering a severe malware attack that forced the company to take down their tax returns database since May 6,…

Read More
The Fileless Malware Attacks Are Here To Stay 1

The Fileless Malware Attacks Are Here To Stay

The development methodology of malware has changed drastically, something that cannot be ignored. A few years ago, the primary objective of the hackers was to rake profit and avoid detection….

Read More
Japanese Government to Deploy Defensive Malware 1

Japanese Government to Deploy Defensive Malware

The Japanese government has decided to create and maintain defensive malware in a bid to secure the country against cyberattacks. Catalin Cimpanu, security reporter at ZDNet, writes, “The Japanese Defense…

Read More
Emotet 1

Emotet Trojan Now Uses IoT And Router Devices To Evade Detection

The Emotet malware has been frequently covered here in Hackercombat since July last year. It is not uncommon for a cyber security-centered website to discuss most if not all of…

Read More
BabyShark Malware Targeting Nuclear and Cryptocurrency Industries

BabyShark Malware Targeting Nuclear and Cryptocurrency Industries

In 2018 Palo Alto Networks’ Unit 42 researchers announced that they have identified a spear phishing campaign that is targeting U.S. National security think tanks and academic institutions. Research indicates…

Read More
Static Vs Dynamic Malware Analysis

Static Malware Analysis Vs Dynamic Malware Analysis

Malware Analysis: An Introduction Cybercriminals are becoming more sophisticated and innovative, new and advanced varieties of malware are coming up, and malware detection is becoming a real challenge. Malware analysis,…

Read More

Page 3 of 21

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register