The Latest in IT Security

Posts Tagged ‘Execution’

This month one of the families introduced to MSRT is Win32/Phorpiex, a worm that spreads via removable drives and has IRC controlled backdoor functionality. In most respects Phorpiex is another worm, with typical command and control via IRC as well as spreading via removable drives. Like many other malware it usually does this by using […]

Read more ...

A new wave of rogue direct messages (DM) are making rounds in Twitter once more. Instead of the message “lol ur famous now”, as we’ve documented before, which coupled the Facebook link leading to a phishing page, the criminals behind this new campaign are now using “what on earth could you be doing in our […]

Read more ...

Today is that fateful day: Election Day. And we’re not short of seeing shenanigans related to this big event that online criminals and scammers have been taking advantage of for months. What we have below are just some of what we found surrounding the elections. First off is a file that goes by the name […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments