[email protected] +603-2181 3666
Extol Threat Intelligent Notification

In the April 7 advisory, we talked about Dyre Wolf banking malware which is a variant of the Dyre Trojan. It was used in a succession of phishing campaign across the globe. Now, cybercriminals are serving Dyre through another channel. Trust cybercriminals to find new ways to host malicious software used in drive-by attacks. One […]

This time Google Drive is being used as a vector for launching CryptoWall ransomware. The payload is delivered through Google Drive platform. The payload in turn runs CryptoWall from a long list of compromised websites. From the compromised webpages, numbering more than 80, several malicious scripts force users to a narrow selection of dedicated domains […]

Panda Security announced today the launch of a new version of Panda Mobile Security, the company’s solution to combat cyber threats on mobile devices. The new Panda Mobile Security allows users to enjoy their devices with complete peace of mind, locate lost or stolen smartphones and tablets, and protect their private information thanks to the […]

With SMS we saw how the language evolved in order to save characters, now the way we express ourselves through mobile devices has experienced a new transformation. With the arrival of instant messaging apps, with WhatsApp on top, there are people who are able to communicate exclusively with emoticons. Humans move freely between images. This […]

IT News

The Trump Hotel Collection, a string of luxury hotel properties tied to business magnate and now Republican presidential candidate Donald Trump, appears to be the latest victim of a credit card breach, according to data shared by several U.S.-based banks. Trump International Hotel and Tower in Chicago. Contacted regarding reports from sources at several banks who traced a […]

I got back from REcon 2015 a week ago and I’m well and truly over the jet lag at last. As usual, it was a great conference with many interesting talks and people. It is always great to meet other reverse engineers from all over the world and discuss new techniques, tools and research. Tradition […]