Tag: Malware

AsyncRAT Spreads As Fake eBook Files, Uses LNK Files

Recent research uncovers a new spreading campaign of AsyncRAT, that targets users…

Stephanie Adlam Stephanie Adlam

Malware Protection

Many people remain unaware of the substantial benefits of malware protection. While…

Stephanie Adlam Stephanie Adlam

Polymorphic vs Metamorphic Virus

Polymorphic and Metamorphic Malware: the Comparison In this article, we consider two…

Stephanie Adlam Stephanie Adlam

Stopabit Virus

Stopabit is an unwanted application that has almost no useful functionality. Users…

Stephanie Adlam Stephanie Adlam

Weather Zero

Weather Zero is a dropper-like unwanted program that disguises itself as a…

Stephanie Adlam Stephanie Adlam

Bloom.exe

Bloom.exe is a malicious miner that masquerades as a legitimate process. Its…

Stephanie Adlam Stephanie Adlam

Trojan:Win32/Casdet!rfn

Trojan:Win32/Casdet!rfn is a detection that indicates the possible presence of malware on…

Stephanie Adlam Stephanie Adlam

Trojan:Win32/Tnega!MSR

Trojan:Win32/Tnega!MSR is a malicious program that functions to deliver other malware. It…

Stephanie Adlam Stephanie Adlam

Virus:Win32/Grenam.VA!MSR

Virus:Win32/Grenam.VA!MSR is a type of malware that can stealthily get into the…

Stephanie Adlam Stephanie Adlam

Heuristic Virus

A heuristic virus is a term for malicious programs detected by heuristic…

Stephanie Adlam Stephanie Adlam

Meduza Stealer

The Malware world evolves constantly, and it would be reckless to ignore…

Stephanie Adlam Stephanie Adlam

How can an attacker execute malware through a script?

Over the last four years, the share of script-based attacks of malware…

Stephanie Adlam Stephanie Adlam