The Latest in IT Security

Posts Tagged ‘configuration file’

With the leak of ZeuS source code, we expected that more cybercriminals would craft their own HTTP controlled bots based on ZeuS.Last week, we started to see the first generation of modified ZeuS based on the leaked source code, called Ice IX. According to the seller’s post on underground forums, one of Ice IX’s main […]

Read more ...

Our team recently encountered a spam run that leads to the download of a ZBOT variant that uses domain-generation technique. The spam run involves messages that arrive in users’ inboxes as a Facebook friend request notification. The message bears a link that the user must click to approve the friend request. Clicking the said link, […]

Read more ...

We recently found a new variant of DroidDreamLight in the Android Market. The app promotes itself as an application which helps users manage APK files on their device. The sample was downloaded 50-100 times before it was removed from the Android Market.The malware sample we found, detected as ANDROIDOS_DORDRAE.M, is inside an app called App […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments