AsyncRAT Spreads As Fake eBook Files, Uses LNK Files
Recent research uncovers a new spreading campaign of AsyncRAT, that targets users…
Malware Protection
Many people remain unaware of the substantial benefits of malware protection. While…
Polymorphic vs Metamorphic Virus
Polymorphic and Metamorphic Malware: the Comparison In this article, we consider two…
Stopabit Virus
Stopabit is an unwanted application that has almost no useful functionality. Users…
Weather Zero
Weather Zero is a dropper-like unwanted program that disguises itself as a…
Bloom.exe
Bloom.exe is a malicious miner that masquerades as a legitimate process. Its…
Trojan:Win32/Casdet!rfn
Trojan:Win32/Casdet!rfn is a detection that indicates the possible presence of malware on…
Trojan:Win32/Tnega!MSR
Trojan:Win32/Tnega!MSR is a malicious program that functions to deliver other malware. It…
Virus:Win32/Grenam.VA!MSR
Virus:Win32/Grenam.VA!MSR is a type of malware that can stealthily get into the…
Heuristic Virus
A heuristic virus is a term for malicious programs detected by heuristic…
Meduza Stealer
The Malware world evolves constantly, and it would be reckless to ignore…
How can an attacker execute malware through a script?
Over the last four years, the share of script-based attacks of malware…