[email protected] +603-2181 3666
Extol Threat Intelligent Notification
IT News

Adobe Systems Inc. says its plans to issue a patch on Wednesday to fix a zero-day vulnerability in its Flash Player software that is reportedly being exploited in active attacks. The flaw was disclosed publicly over the weekend after hackers broke into and posted online hundreds of gigabytes of data from Hacking Team, a controversial […]

3D printing has a great future, but also begins to be part of our present. For years, there were who anticipated the arrival of a third industrial revolution starring this technology. A new era in which companies from different sectors will need to reinvent their processes and look for new ways to add value, since […]

By becoming popular, they turn into a real danger. The more famous an application is, the more likely it will be used by cybercriminals to carry out frauds, which may turn out very expensive for those distracted users. The perfect example is WhatsApp. Each novelty announced by the instant messaging service is exploited immediately by […]

IT News

The Internet is a fantastic resource for researching the reputation of companies with which you may wish to do business. Unfortunately, this same ease-of-use can lull the unwary into falling for marketing scams originally perfected by spammers: Namely, fake reviews and dodgy search engine manipulation techniques that seek to drown out legitimate, negative reviews in a […]

In the April 7 advisory, we talked about Dyre Wolf banking malware which is a variant of the Dyre Trojan. It was used in a succession of phishing campaign across the globe. Now, cybercriminals are serving Dyre through another channel. Trust cybercriminals to find new ways to host malicious software used in drive-by attacks. One […]

This time Google Drive is being used as a vector for launching CryptoWall ransomware. The payload is delivered through Google Drive platform. The payload in turn runs CryptoWall from a long list of compromised websites. From the compromised webpages, numbering more than 80, several malicious scripts force users to a narrow selection of dedicated domains […]