Security Bulletins
Latest Malware Updates
Downloader.Busadom!g102/27/2015Infostealer.Posteal02/26/2015Downloader.Busadom02/26/2015Trojan.Ladocosm02/26/2015SONAR.SuspDocRun02/25/2015SONAR.SuspHelpRun02/25/2015W32.Tempedreve.D!inf02/25/2015SONAR.PUA!AlnadInsta02/25/2015SONAR.Infostealer!g502/25/2015SONAR.Infostealer!g402/25/2015 |
News
ZeuS Trojan uses new Upatre loader to replicateAlong with Pony Loader, Upatre loader uses Cutwail botnet to replicate. 10/10/2013Dell: Cutwail botnet spreads Trojan for Android-devicesMalicious program is downloaded to the systems posing as an update for Adobe Flash Player. 04/09/2013Grum botnet brought back to lifeResearchers found five new C&C servers connected to botnet. 03/27/2013Carna botnet consists of 420 million IP-addressesHacker created botnet in order to demonstrate the map of devices that use IPv4 protocol. 03/20/2013Researchers: Kelihos returns with more sufficient functionsThe new version of the botnet comes with better resistance to sinkholing techniques. 02/12/2013Symantec and Microsoft Eliminated Russian Bamital BotnetUsing the botnet cybercriminals managed to control hundreds of thousand PCs around the world. 02/08/2013Grum completely shut downAn international team of infosec professionals shut down all the botnet’s C&Cs. 07/19/2012Dutch authorities take control over two servers of the Grum botnetThe botnet spread almost 18% of the world’s spam on the Internet and is the third largest after the Cutwail and Lethic. 07/18/2012Dr. Web: Win32.Rmnet.16 attacks users in UK, Australia and USRussian antivirus company Dr. Web discovered a botnet created by new variant of Win32.Rmnet.12 malware. 05/15/2012New Mac threat discoveredThe Sabpab Trojan horse allows hackers to upload and download any file. 04/16/2012Apple tries to unplug an AV’s serverApple claims that an AV’s server is used as a Falshback C&C. 04/13/2012Virus Flashback affected 550,000 PCsMalware was able to infect 550,000 computers based on Mac OS X. 04/09/2012Microsoft shuts down 2 botnet C&CSoftware giant takes legal actions to disrupt ZueS botnets. 03/26/2012Anonymous hacktivists were infected with ZeuS TrojanAnonymous participants lost their personal data in the course of conducting DDoS-attacks. 03/06/2012Zeusbot has leveraged P2P communicationSince the last update each bot in the network is a minimal Web-server, capable of handling HTTP requests and performing C&C functionalities. 02/29/2012German Police Used Trojan to Tap Skype Calls and IM Chats (Update)German researchers captured and analyzed a new Trojan horse which they claim might be used by police to tap Skype calls and IM messages. 10/11/2011SpyEye banking trojan: now with SMS hijacking capabilityThe SpyEye banking trojan has acquired the ability to reroute one-time passwords sent to victims' cellphones, a measure that bypasses protections more and more financial institutions are adopting. 10/07/2011ZeuS Source Code Leaked to the InternetSource code of latest version of the ZeuS crimeware kit has been leaked on the Internet. 05/11/2011 |
Security Advisories Database
Remote Code Execution Vulnerability in Microsoft OpenType Font DriverA remote attacker can execute arbitrary code on the target system. 07/21/2015Multiple Vulnerabilities in Linux kernel03/04/2015SQL Injection Vulnerability in PiwigoSQL inection vulnerability has been discovered in Piwigo. 02/05/2015Cross-site Scripting Vulnerability in DotNetNukeA cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke. 02/05/2015Cross-site Scripting Vulnerability in Hitachi Command SuiteA cross-site scripting vulnerability was found in Hitachi Command Suite. 02/02/2015Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk HandlingAn attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-ForwardsAn attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"An attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in Linux Kernel spliceAn attacker can perform a denial of service attack. 01/29/2015Denial of service vulnerability in Python Pillow Module PNG Text Chunks DecompressionAn attacker can perform a denial of service attack. 01/20/2015 |