Dissecting Upatre Malware
Background Trojan Upatre, also known as Trojan Downloader:Win32 Upatre (Microsoft), helps downloading other piece of malicious software from already hardcoded destination within Malware file. However,...
View ArticleCredential Harvester Banking Trojan – Vawtrak aka NeverQuest
According to reports, Vawktrak is infecting banking, gaming and social network users mainly across United Kingdom, the United States, Germany, Australia, New Zealand, and many other countries across...
View ArticleVulnerability in Microsoft HTTP.sys can lead to Remote Code Execution
A remote code execution vulnerability has been found in Microsoft HTTP.sys. The vulnerability is due to an issue with the processing of HTTP messages in the HTTP protocol stack. A remote...
View ArticleCaution: Win32/AutoRun.IRCBot is on prowl
Cyberoam Threat Research Labs (CTRL) has detected a new malware which is capable of affecting all versions of Windows at present. Known as Win32/AutoRun.IRCBot, the bot agent has capabilities to...
View ArticleA lethal variant of Win32/AutoRun.IRCBot detected in the wild
Cyberoam Threat Research Labs (CTRL) recently reported a botnet (Win32/AutoRun.IRCBot) affecting Windows. Now another variant of this malware, named as Variant.Symmi, has come into the picture. This...
View ArticleSSL/TLS protocols hit by LogJam Vulnerability
SSL/TLS protocols are becoming an ungainly spectacle, yet again. Researchers at the University of Michigan and the French research institute Inria have together unveiled a new hidden vulnerability in...
View ArticleBackdoor.MSIL.Kazybot Enters Windows
The Windows platform is at the crosshairs of Backdoor.MSIL.Kazybot. The Bot agent and Backdoor contacts remote servers, identifies itself and sends system information to the remote server. After...
View ArticleMoose might mess up your Home Router!
A new malware infecting series of Home based routers/modems running on MIPS and ARM architecture has been spotted. The said malware family specifically targets consumer devices based on Linux systems,...
View ArticleThird Party Vendors – The Weak Links in Network Security
“Your cybersecurity is only as good or bad as that of your vendors.” By 2019, the cyber security market will be worth a mammoth $155.74 billion. The market for next generation security appliances like...
View ArticleRemote Code Execution Vulnerability Detected in Microsoft Windows
The vulnerability tally in Microsoft Windows continues to grow and this one is of the Remote Code Execution (RCE) variety. Known as the OpenType Font Driver vulnerability, its existence can be...
View Article
More Pages to Explore .....