Home Tags Malicious Code

Tag: Malicious Code

We confront hundreds of thousands of new threats every day and we can see that threat actors are on a constant lookout for new attack opportunities.

According to our research, connecting a software license management token to a computer may open a hidden remote access channel for an attacker.
A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vuln...
“Low complexityrdquo; hack for Transmission client may work against other clients, too.

Still Stealing

Two years ago we published a blogpost about a popular malware that was being distributed from the Google Play Store.
In October and November 2017 we found 85 new malicious apps on Google Play that are stealing credentials for VK.com
An Android vulnerability called Janus allows attackers to inject malicious code into signed Android apps.
Google gives Administrators new ways to lock down the browser.
During past few years, the number and quality of attacks aimed financial sector organizations has continuously grown.

The financial institutions that have not already thought about cyber security, will soon face the consequences of hacker attacks.
A vulnerability in Cisco WebEx Meeting Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of an affected system. The vulnerability is due to insufficient input validation of some pa...
How do you fix a program without the source code? You patch the binary directly.
Block would happen in the event advertisers canrsquo;t curb malicious ads on their own.
Moscow-based AV provider challenges claims it helped Russian spies.
2017 was one of the most intense in terms of incidents affecting the information security of industrial systems.
Security researchers discovered and reported hundreds of new vulnerabilities, warned of new threat vectors in ICS and technological processes, provided data on accidental infections of industrial systems and detected targeted attacks.