[email protected] +603-2181 3666
Extol Threat Intelligent Notification

What makes one novel strain of malicious software more dangerous or noteworthy than another? Is it the sheer capability and feature set of the new malware, or are these qualities meaningless without also considering the skills, intentions and ingenuity of the person wielding it? Most experts probably would say it’s important to consider attribution insofar […]

Three years ago, on May 28th 2012, we announced the discovery of a malware known as Flame. At the same time we published our FAQ, CrySyS Lab posted their thorough analysis of sKyWIper. A few days earlier, Maher CERT published IOCs for Flamer. In short, Flame, sKyWIper and Flamer are different names for the same […]

Statistics on botnet-assisted DDoS attacks in Q1 2015 [pdf] Methodology A DDoS (Distributed Denial of Service) attack is one of the techniques mostly often used by cybercriminals. It is intended to reduce an information system, typically a website, to a state where it cannot be accessed by legitimate users. One popular DDoS scenario is a […]

Do you have an iPhone? Yes? Well, then the following news may be of interest to you! A new security flaw has been discovered in iOS, Apple’s operating system. This vulnerability affects iPhones running iOS version 8.3, although other versions could also be affected. According to the BBC, a specially crafted text message can cause […]

IT News

Cybercriminals who specialize in phishing — or tricking people into giving up usernames and passwords at fake bank and ecommerce sites — aren’t generally considered the most sophisticated crooks, but occasionally they do exhibit creativity and chutzpah. That’s most definitely the case with a phishing gang that calls itself the “Manipulaters Team”, whose Web site boasts […]

PandaLabs, Panda Security‘s antil-malware laboratory, today published its Quarterly Report for Q1, analyzing the IT security events and incidents from January through March 2015. The multinational security vendor detected over 225,000 new malware strains per day in the first quarter of the year,  with peaks reaching 500,000. This record-breaking figure represents a 40 percent increase […]

Grabit and the RATs
May 28, 2015

Not so long ago, Kaspersky clients in the United States approached Kaspersky researchers with a request to investigate a new type of malicious software that they were able to recover from their organizations’ servers. The malware calls itself Grabit and is distinctive because of its versatile behavior. Every sample we found was different in size […]

IT News

Mobile spyware maker mSpy has expended a great deal of energy denying and then later downplaying a breach involving data stolen from tens of thousands of mobile devices running its software. Unfortunately for victims of this breach, mSpy’s lackadaisical response has left millions of screenshots taken from those devices wide open and exposed to the […]

January 2015 marked a year since you joined Panda, how has the company changed over the past 15 months? The company has gone through three major changes during this time: The first, and probably the most important one, is the return to growth. The results we are getting now indicate that the market is responding […]