Recently, a researcher nicknamed MalwareTech famous from stopping the WannaCry ransomware got arrested for his alleged contribution to creating the Kronos…

Last year, we reported on a new modular malware called TrickBot that uses a network protocol similar to Dyreza. The malware was…

A new malicious clicker has emerged onto third-party app stores. Chinese in origin, the malicious app uses heavy obfuscation and poses…

In a simultaneous press conference issued by the Dutch police and US Attorney General Jeff Sessions we learned that the Dark Web…

Terror EK is an exploit kit made from a mishmash of stolen code and with very limited distribution. In the past few months,…

Last week, we took a look at some of your malware infection stories, took a stroll through the basics of PowerShell,…

There is a growing trend among malware authors to incorporate legitimate applications in their malicious package. This time, we analyzed a…

I bet I went about learning PowerShell the wrong way, so I may need your help, readers of this blog. If…

Unless you’ve been stuck at a fiery music festival, I don’t need to tell you the threat landscape is constantly evolving…

A couple weeks ago, two new Malware-as-a-Service (MaaS) offerings for the Mac became available. These two offerings – a backdoor named MacSpy and…