The Latest in IT Security

Posts Tagged ‘trojan’

Not much is known about the cyber espionage group that wields the so-called “Dukes”: backdoors and information stealers that all have “Duke” in their name, and have been used to compromise high-value, government-level targets. Various researchers and companies have been tracking the group’s campaigns for several years, as they attacked multiple government entities and institutions […]

Read more ...

It was around 2007 when we first encountered the ‘Win32/ZeusBot Trojan Horse’, AKA ‘ZBot’.The first versions of the malware was used against the U.S. Department of Transportation, mainly in order to steal information such as various passwords.Since then, multiple variants have been released, adding more and more functionalities and ‘bad’ stuff with every update, mainly […]

Read more ...

New trick from cybercriminals of Brazil – a suspicious message arrives to the user with a file attached named “Comprovante_Internet_Banking.rtf”?, translated from Portuguese it means “Receipt from Internet Banking”?:Are you waiting a banking receipt via email?If the user were to open the file it would be presented with the image of a bank receipt and […]

Read more ...


Categories

SUNDAY, MARCH 16, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments