News
Corkow: Analysis of a business-oriented banking Trojan Win32/Corkow is banking malware with a focus on corporate banking users. We can confirm that several thousand users, mostly in Russia and ...
The Win32/Gataka banking Trojan uses modular design to accomplish a variety of malicious activities including facilitating fraudulent bank transfers. ESET researchers present the first part of ...
The primarily IcedID-flavored banking trojan spam campaigns were coming in at a fever pitch: Spikes hit more than 100 detections a day.
Recently there have been a lot of reports of Windows Defender suddenly detecting files as Trojan:Win32/Bluteal.B!rfn. The detected files range from CPU miners, which would make sense, to ...
The Razy Trojan is targeting legitimate browser extensions and is spoofing search results in the quest to raid cryptocurrency wallets and steal virtual coins from victims. According to new ...
Just as the Trojan horse appeared to be a legitimate gift hiding an inner threat, a Trojan virus looks legitimate but hides inner malware, typically as an attachment in an email or downloadable file.
Joe Stewart, the director of malware research at SecureWorks, gave a rash of interviews yesterday documenting the devious and dangerous Clampi Trojan (also known as Ligats, llomo, or Rscan). The ...
Because the new malware examples, which Kaspersky has named MEM:Trojan.win32.cometer and MEM:Trojan.win32.metasploit, reside in memory, they can’t be found by standard antivirus packages that ...
There are so many ways in which malware attacks can be detrimental to your Android devices. So what is the best way to protect from the trojan danger ?
Companies in 17 countries, including South Africa, the UK, Canada, Argentina, Mexico and Spain, have been struck by a mass ransomware attack exploiting multiple previously unknown vulnerabilities ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results