A week in security (Apr 17 – Apr 23)

A compilation of notable security news and blog posts from the 17th of April to the 23rd. We focused on the return of Locky ransomware, Moker Trojan, and more.

Read more

Elusive Moker Trojan is back

We finally have gotten our hands on a sample of Moker Trojan (that was discovered in 2015). This article will be a deep dive in its capabilities.

Read more

Binary Options malvertising campaign drops ISFB banking Trojan

We take a look at a widespread and yet stealthy malvertising campaign distributing the ISFB banking Trojan via decoy websites.

Read more

Report: Cybercrime climate shifts dramatically in first quarter

The first quarter of 2017 brought with it some significant changes to the threat landscape and we aren’t talking about heavy ransomware distribution either. Threats which were previously believed to be serious contenders this year have nearly vanished entirely, while new threats and infection techniques have forced the security community to reconsider collection and analysis efforts.

Read more

Diamond Fox – part 2: let’s dive in the code

In a previous post we made an initial analysis of a Diamond Fox bot delivered by the Nebula Exploit Kit (more about the campaign can be found here). We described the way to unpack the protection layer in order to get the core, written in Visual Basic, that can be decompiled. In this second part of…

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language