Secure your virtual and cloud environments without performance compromises.
Detect, analyze, adapt and respond to targeted attacks before damage is done.
Secure all your users’ activity – any application, any device, anywhere.
This malware is related to the Shadow Broker dump that was released on late April, 2017. It exploits various vulnerabilities in Windows.Read more
TROJ_ETERNALROM.A is a hacking tool released by a hacking group called Shadow Brokers.Read more
This malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild.Read more
New Linux Arm malware spread via RFIs in cgi-bin scripts. This backdoor executes commands from a remote malicious user, effectively compromising the affected system.Read more
This malware, detected late January 2017, infects users through a Netflix login generator application. Once users attempt to use the application, the ransomware is installed and then executed on their system.Read more
This malware was discovered late January 2017 and has been found to affect systems it detects to be in Saudi Arabia. It encrypts .Read more
This ransomware uses a client console, giving the affected user a variety of options. including a free trial individual file restore.Read more
Connect with us on
| | | |