Malware
This malware, detected April 2017, is a Trojan related to the hacking group Shadow Brokers' leak. The exploit targets server vulnerabilities and leverages internet and network protocols.
Read moreThis malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild.
Read moreThis malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild.
Read moreThis malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild.
Read moreThis malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild.
Read moreThis malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild.
Read moreNew Linux Arm malware spread via RFIs in cgi-bin scripts. This Backdoor executes commands from a remote malicious user, effectively compromising the affected system.
Read moreThis malware, detected late January 2017, infects users through a Netflix login generator application. Once users attempt to use the application, the ransomware is installed and then executed on their system.
Read moreThis malware was discovered late January 2017 and has been found to affect systems it detects to be in Saudi Arabia. It encrypts .
Read moreThis ransomware uses a client console, giving the affected user a variety of options. including a free trial individual file restore.
Read more