Secure your virtual and cloud environments without performance compromises.
Detect, analyze, adapt and respond to targeted attacks before damage is done.
Secure all your users’ activity – any application, any device, anywhere.
This malware is related to the Shadow Broker dump that was released on late April, 2017. It exploits various vulnerabilities in Windows.Read more
TROJ_ETERNALROM.A is a hacking tool released by a hacking group called Shadow Brokers.Read more
This malware, detected April 2017, is a Trojan related to the hacking group Shadow Brokers' leak. The exploit targets server vulnerabilities and leverages internet and network protocols.Read more
This malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild.Read more
New Linux Arm malware spread via RFIs in cgi-bin scripts. This Backdoor executes commands from a remote malicious user, effectively compromising the affected system.Read more
This malware, detected late January 2017, infects users through a Netflix login generator application. Once users attempt to use the application, the ransomware is installed and then executed on their system.Read more
connect with us on
twitter | facebook | youtube | linkedin | feed