THREAT INTELLIGENCE

Jan 28,2019 05:19:32
W97M.Downloader and X97M.Downloader are Microsoft Office files that contain a malicious macro. The only difference between them is that W97M detections are related to Word files and X97M detections are...[ read more ]

Jan 15,2019 07:06:06
In a recent development Cisco Adaptive Security Appliance (ASA) web interface allowing hackers to attack remotely, and cause an affected device to reload unexpectedly, causing in denial of service (DoS)...[ read more ]

Jan 15,2019 05:42:24
SpectreRSB utilize a process found in all advance CPU called “speculative execution”, that has the primary function of improving performance by computing operations in advance and later discarding unneeded data....[ read more ]

Jan 03,2019 06:33:39
Cryptomining based Wannamine malware outbreak still actively attacking the windows users around the globe that using NSA exploit Eternalblue to penetrate the unpatched SMB enabled computers to gain high privileged...[ read more ]

Dec 26,2018 10:43:20
Xbash malware has strong intrusion capabilities, especially using ransomware and coin mining along with the self-replicative function to propagate across the infected network to compromise the vulnerable system. It also...[ read more ]

Dec 18,2018 06:49:56
Xorist is a Ransomware type virus created using Encoder Builder v.24 from to lock victim’s data. It emerged in 2016, but, during the past two years, the malware has received...[ read more ]

Dec 17,2018 10:58:50
Asacub Trojan was first detected in 2015. Asacub Trojan belong to AnorideOS.Asacub family, the first version of this malware was detected, analysed, and found to be more adept at spying...[ read more ]

Sep 27,2018 05:57:36
Snyk security researchers at British software have identified a critical vulnerability “Zip Slip” that affect thousands of projects across many industries. The vulnerability is an issue in the way of...[ read more ]

Sep 27,2018 05:44:19
A browser hijacker is a malware program that modifies web browser settings without the user’s permission and redirects the user to visit unknown websites. It is also called a browser...[ read more ]

Sep 05,2018 07:20:24
Trojan:Win32/Injector is a malicious program that is unable to spread on its own. It performs a number of actions of an attacker’s choice on an affected computer. Injector malware is...[ read more ]

1 2 3 4 5 6
LTS Secure Locations
  • Florida: 407-965-5509
    Los Angeles: 323-544-5013
    Mid West: 800 689 4506

  • Chicago/Midwest– 2406 Schumacher Drive, Mishawaka, IN, 46545

    201, Tower S4, Phase II, Cybercity, Magarpatta Township, Hadapsar, Pune-411013

Leave us a messages Leave us a messages

← Prev Step

Thanks for contacting us. We'll get back to you as soon as we can.

Please provide a valid name, email, and question.

Powered by LivelyChat
Powered by LivelyChat Delete History