Skip to content
Securezoo Blog
  • Home
  • Threat Center Blog
    • Application Security
    • Cloud Security
    • Cryptography
    • Cybersecurity Articles
    • Cybersecurity Attacks
    • Identity & Access Management
    • Insider Threats
    • Internet of Things (IoT)
    • MalwareCyber security malware threats.
    • Network Security
    • Password Management
    • Regulations & Laws
    • Security Updates & Patches
    • Third-Party Security
    • Vulnerabilities & Exploits
    • Zero-days
  • Resources
  • Security Guidelines
    • CIS
    • PCI
    • NIST
    • Other
  • Services
    • Security Assessment
  • About Us
  • Contact Us
  • Privacy Policy
Menu Close
  • Home
  • Threat Center Blog
    • Application Security
    • Cloud Security
    • Cryptography
    • Cybersecurity Articles
    • Cybersecurity Attacks
    • Identity & Access Management
    • Insider Threats
    • Internet of Things (IoT)
    • Malware
    • Network Security
    • Password Management
    • Regulations & Laws
    • Security Updates & Patches
    • Third-Party Security
    • Vulnerabilities & Exploits
    • Zero-days
  • Resources
  • Security Guidelines
    • CIS
    • PCI
    • NIST
    • Other
  • Services
    • Security Assessment
  • About Us
  • Contact Us
  • Privacy Policy

AV

  1. Home>
  2. Cybersecurity Threat Center>
  3. AV

Loapi trojan – “jack of all trades”

  • Post author:Frank Crast
  • Post published:December 19, 2017
  • Post category:Malware/Mobile Security
  • Post comments:0 Comments

Researchers at Kaspersky Labs have discovered a new Android Trojan dubbed Loapi that has a modular architecture designed to conduct multiple malicious activities.

Continue Reading Loapi trojan – “jack of all trades”

AutoIT used to evade AV

  • Post author:Frank Crast
  • Post published:November 13, 2017
  • Post category:Malware
  • Post comments:0 Comments

IBM researchers discovered a new way hackers are trying to evade antivirus (AV) software detections using a popular automation tool AutoIT.

Continue Reading AutoIT used to evade AV

USB drives used to plant malware

  • Post author:Frank Crast
  • Post published:August 30, 2017
  • Post category:Cryptography/Endpoint Security/Malware
  • Post comments:0 Comments

USB flash drives can often be a threat to your organization as malicious insiders could use them to steal your most sensitive data. Organizations should also be aware that USB drives can also be used to plant malware, such as backdoors and fileless malware.

Continue Reading USB drives used to plant malware

Categories

Archives

RSS Securezoo Cyber Security Threat Center – Latest Posts

  • FreakOut malware exploits new Linux vulnerabilities January 20, 2021
  • DNSpooq: Dnsmasq vulnerabilities open up network and Linux devices to attack January 19, 2021
  • NSA issues new guidance on encrypted DNS January 18, 2021
  • Authorities take down ‘world’s largest’ darknet marketplace January 18, 2021
  • FBI: Cyber criminals target employee credentials via voice phishing attacks January 18, 2021
  • Apache patches Tomcat vulnerability (CVE-2021-24122) January 15, 2021
  • Cisco patches High risk vulnerabilities in Small Business routers and other products January 15, 2021
  • Adobe releases security updates for Photoshop, Illustrator and other products January 14, 2021
  • Microsoft January 2021 Security Updates (to include zero-day RCE patch) January 13, 2021
  • High risk vulnerability in Zyxel firewalls and AP controllers exploited in the wild January 11, 2021
Copyright © 2021 Securezoo LLC. All rights reserved.