RIG Exploit Kit Delivering RedLine Via Internet Explorer
Researchers at Bitdefender have discovered a new campaign of cybercriminals using the RIG exploit kit to distribute the famous RedLine malware, which aims to steal … Read more
Researchers at Bitdefender have discovered a new campaign of cybercriminals using the RIG exploit kit to distribute the famous RedLine malware, which aims to steal … Read more
A Trojan (Trojan) is a malicious agent whose main difference from a classic virus is its distribution method: it usually enters the system under the … Read more
With court permission, Microsoft seized control of 65 domains used to control the Zloader botnet. It was possible to identify them through the joint efforts … Read more