• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Cyber Threat Defense

Cyber Security News

Cybereason

Keylogger Malware Fauxpersky Running Wild

March 30, 2018 By News Team Leave a Comment

A new kind of keylogger malware has been detected infecting computers, specifically Windows PCs, in the wild via USB drives. Cybereason, a Boston, Mass.-based security firm, discovered the malware and named it Fauxpersky as it impersonates the … [Read more...] about Keylogger Malware Fauxpersky Running Wild

Filed Under: Malware Tagged With: AutoHotKey, AutoID, Cybereason, Fauxpersky, Google Forms, Kaspersky, keylogger malware, Malware, password theft, USB drives, Windows PCs

DDoS Attacks Using Memcached Are Lethal

March 9, 2018 By News Team Leave a Comment

Just one week following the huge DDoS attack against code repository GitHub using Memcached, the same technique was used to direct an even larger attack against an unnamed U.S. service provider. According to DDoS protection firm Arbor Networks, the … [Read more...] about DDoS Attacks Using Memcached Are Lethal

Filed Under: DDoS, Ransomware Tagged With: Akamai, Arbor Networks, Brian Krebs, CloudFlare, Cybereason, GitHub, MemCached DDoS, memcached ransom payload, ransomware, UDP-based memcaching

Primary Sidebar

Recent Articles

  • How Profits Inspires Virus Developers
  • What’s Propelling A10 Networks Inc (NYSE: ATEN) After Higher Shorts Reported?
  • FacexWorm Targets Facebook Messenger
  • Cisco Systems Webex Flaws Allows Remote Users To Execute Code
  • Europe sees Radical Drop in DDoS Attacks Since Seizure of Webstresser Site

Categories

  • Application Security
  • Bitcoin
  • Bot Defense
  • Browser Security
  • Business Models
  • Critical infrastructure
  • Cryptocurrencies
  • Cryptojacking
  • Cryptomining
  • Cybercrime
  • cybersecurity
  • Data Breach
  • Data Theft
  • DDoS
  • Endpoint Security
  • Espionage
  • Feature
  • Firewall
  • Fraud
  • Government
  • Hacking
  • Hacking Tools
  • IoT
  • Layer7
  • Leaks
  • Malware
  • Mining
  • Mobile security
  • Point of Sale Devices
  • Quantum Encryption
  • Quantum Security
  • Ransomware
  • Routing
  • Uncategorized
  • Vault7
  • Vault8
  • Vulnerabilities
  • Wikileaks

Secondary Sidebar

Cyber Threat Defense.net | Copyright © 2019 All product names, logos, and brands are property of their respective owners. All company, product and service names used on site are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.