Monthly Archives: July 2016

AdGholas Malvertising Campaigns Infect Thousands of Users Daily

Security researchers at proofpoint have alerted of a malicious campaigns AdGholas which uses sophisticated techniques. This made the cyber-attack stay hidden for months and served to infiltrate millions of computers.

EmPyre – post-exploitation OS X/Linux agent

EmPyre - RAT (Remote Access Trojan) EmPyre is a pure Python post-exploitation agent built on cryptologically-secure communications and a flexible architecture.

AVG Released Bart Ransomware Decryptor

Security Software Company AVG released a new free utility to recover files encrypted with Bart ransomware, Bart is a new malware that was initially discovered on June, this was sent using spam messages by Necurs botnet.

Google Chrome Extension Hijack Facebook Accounts

Chrome extension that can be used by cyber criminal to Hijack Facebook Accounts and launch DDoS attacks or steal victim passwords and more.

Pocsuite – Remote Vulnerability Testing Framework

Scanning systems is very important when you are evaluating the security on your internal assets. One of the tools that can be used during a security assessment is Pocsuite.

Mimikittenz- A post-exploitation PowerShell Tool

mimikittenz is a post-exploitation powershell tool that utilizes the Windows function ReadProcessMemory() in order to extract plain-text passwords from various target processes

Android.Fakebank.B Android Trojan Prevent Infected Systems from Calling Bank Support

Security researchers at Symantec alerting of a malware that was previously discovered in 2013. This malware is infecting android systems and called Android.Fakebank.B.