Malware

  • This malware is related to the Shadow Broker dump that was released on late April, 2017. It exploits various vulnerabilities in Windows.
    Read more

  • TROJ_ETERNALROM.A is a hacking tool released by a hacking group called Shadow Brokers.
    Read more

  • This malware, detected April 2017, is a Trojan related to the hacking group Shadow Brokers' leak. The exploit targets server vulnerabilities and leverages internet and network protocols.
    Read more

  • This malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild.
    Read more

  • This malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild.
    Read more

  • This malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild.
    Read more

  • This malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild.
    Read more

  • This malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild.
    Read more

  • New Linux Arm malware spread via RFIs in cgi-bin scripts. This Backdoor executes commands from a remote malicious user, effectively compromising the affected system.
    Read more

  • This malware, detected late January 2017, infects users through a Netflix login generator application. Once users attempt to use the application, the ransomware is installed and then executed on their system.
    Read more

 

connect with us on

facebook youtube linkedin feed