TeslaCrypt 2.0: Cyber Crime Malware Behavior, Capabilities and Communications
TeslaCrypt is a C++ compiled binary that begins encrypting files on infected machines immediately after execution. Notably, this family...


TorrentLocker Actors Fix Encryption Flaw
Shortly after researchers revealed that TorrentLocker contained an encryption flaw, the attackers modified the code to fix this error....


iSIGHT Partners Reveals Operation SMN, Tailgater Team and Axiom Group
Earlier today (Tuesday, October 28th ) iSIGHT Partners proudly participated in the public disclosure of threat intelligence on a prolific...


iSIGHT Partners Discovers 0-Day Being Used by Sandworm Team
On Tuesday, October 14, 2014, iSIGHT Partners – in close collaboration with Microsoft – announced the discovery of a zero-day...


Analysis of ‘TorrentLocker’ – A New Strain of Ransomware Using Components of CryptoLocker and Crypto
TorrentLocker is a type of ransomware that mimics features from both CryptoLocker and CryptoWall. It is very successful at encrypting...

How to bypass Zeus Trojan’s self protection mechanism ~ by Raashid Bhat
Spammers are good when it comes to intimidating users to open the attachment . One of the recent pathetic and cruel one was Hi A Person...


How to Become a Certified Malware Analysis Expert
INTRODUCTION: Cyber Security, a term more commonly used in today’s ever-present battle to defend companies, governments, and personal...