The Latest in IT Security

Posts Tagged ‘document files’

We’ve been seeing an increase in Taidoor downloaders in the wild, but instead of embedding the backdoor in email attachments, the current trend in Taidoor-related attacks is to include an attachment with a Taidoor-downloading Trojan.Based on the sample set we gathered, it appears this type of technique has only been used this year. For the […]

Read more ...

Designed in 2007 and introduced in late 2009, the Go programming language developed by Google has been gaining momentum the past three years. It is now being used to develop malware. Recently seen in the wild, Trojan.Encriyoko is a new threat associated with components which are written in Go. The Trojan attempts to encrypt various […]

Read more ...

Over the past number of days, we have received feedback from customers that the number of Trojan.Exprez.B detections in Spanish regions has been steadily increasing. Trojan.Exprez.B is a file infector that replaces .exe, .doc, and .docx files on a compromised computer with a copy of itself. This copy of the Trojan also contains the original […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments