• All
  • Company
  • Industry
  • News
  • Partners
Google removes another set of malicious apps from play marketplace

Last week we blogged about the importance of having a cybersecurity plan address the risks of Web Applications here. Today it's been reported that Google has removed not one, but two malicious apps ZTORG Trojans from their play marketplace (and this is not the second time in the month of June!). A researcher with Kaspersky Lab on Tuesday described how attackers managed to evade settings set in place by Google Play’s VerifyApps malware scanner...

Read More
There’s a New Trojan in Town, Spreading Through Targeted Email Campaign

The authors of a malware sample that has been around for more than two years have yet another trick for distributing it. The Kovter malware sample that has infected systems around the world for the past couple of years is proving to be a case study in how threat actors constantly tweak their malware to keep one step ahead of the defenders. Trojan Kovter surfaced about two years ago as a screenlocker...

Read More
Insider Threat Trojan, Delilah, Makes Her Debut

According to Gartner, “Delilah” is the world’s first insider threat Trojan that targets individuals via social engineering and/or extortion, sometimes using ransomware techniques. It allows attackers to capture sensitive and sometimes compromising footage of victim’s in order to extort them into an action – such as carrying out actions that could cause serious damage to their employers. Israeli threat-intelligence security firm Diskin Advanced Technologies (DAT), is the one who discovered the Trojan....

Read More
An Interloper Listening in On Your Calls

While most backdoor attacks have limited functionality, Skype has a sophisticated nuisance that’s come-a-knocking, referred to as T900, a variant of the T5000 malware family. Secure Sense partner FireEye reported about this family back in 2014, when the T5000 sent out a spear-phishing campaign through emails with an attachment titled, “Malaysian Airlines MH370.doc”. When opened, this blank document released malicious code onto user’s systems. This Trojan however, poses an unexpected attack...

Read More