The Latest in IT Security

Posts Tagged ‘prevalence’

Like any other businesses, scammers operate within a certain model to ensure the continuity of their schemes. In my previous post, I discussed in details about a typical scammer’s profile, trust model, and the strategies they use to get hold and sustain customers. This time around, we’ll look into the business model that they use […]

Read more ...

The family added to the February release of the Malicious Software Removal Tool is Win32/Sirefef. Win32/Sirefef is a highly prevalent complex multi-component family which continues to evolve. The payload for current variants may include such actions as modifying browser search engine results, generating pay-per-click revenue and performing Bitcoin mining on an affected computer.   The first detection […]

Read more ...

We recently came across a sample of a back door remote access tool (RAT) written entirely in Java. The RAT is freely distributed on underground forums, free for any registered forum user to download. It is named Frutas, which means “fruit” in Spanish. Figure 1. Frutas logo The Frutas RAT allows attackers to create a connect-back client […]

Read more ...


Categories

FRIDAY, APRIL 04, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments