[email protected] +603-2181 3666
Extol Threat Intelligent Notification

In June last year, US and European enforcement agencies and security firms worldwide, blocked the spread of Gameover Zeus botnet and brought it under control. This put a damper on Cryptolocker ransomware, as it relied on the servers used in the Zeus botnet.   Gameover Zeus and Cryptolocker are some of the well-known malware that […]

WhatsApp – Você recebeu uma menssagem de voz… Have you also received this notification and understood it to mean that you have a voice message in WhatsApp? Yea, well, it’s nothing of the sort! As we already warned you in May, cybercriminals are continuing to try and attack us via emails in which they urge us […]

Today I ran into a typical fraud email claiming to come from a U.S. bank but with a twist! Analyzing the attachment, it turns out that there’s no malware inside but instead a new middle step to fool lesser security software. The original file name is “Swift confirmation .pdf” and it was created using Microsoft […]

New activity of the Blue Termite APT
August 20, 2015

Introduction In October 2014, Kaspersky Lab started to research “Blue Termite”, an Advanced Persistent Threat (APT) targeting Japan. The oldest sample we’ve seen up to now is from November 2013. This is not the first time the country has been a victim of an APT. However, the attack is different in two respects: unlike other […]

What started out as a dating site – albeit a controversial one at that – has turned into a nightmare. Ashley Madison, a dating site for married people who are looking to have an affair on the side, suffered a devastating cyberattack this week as hackers published private details relating to nearly 40 million users. The […]

Today, I received this message from a friend living in Mexico via Whatsapp. According to the message, Starbucks is giving away 500 in local currency credits if you take their survey, so my friend asked me to take a quick look to determine if it’s real. Sadly for the coffee lovers among us, this is […]

Infrastructure owners must regularly check their resources for the presence of malicious components. One of the ways in which a resource may become infected is as a result of “zero-day” vulnerability exploitation by cybercriminals. In this case, the developers of security tools used to protect the information system may be as yet unaware of the […]

Direct attacks, identity and information theft of all sorts (especially social engineering), persistent advanced threats… the risks associated with information security are continually multiplying in a world which is increasingly more digital, mobile, and multi-device based. With this backdrop it is no surprise that cybersecurity experts are in high demand along with professionals in other […]

IT News

Many news sites and blogs are reporting that the data stolen last month from 37 million users of AshleyMadison.com — a site that facilitates cheating and extramarital affairs — has finally been posted online for the world to see. In the past 48 hours, several huge dumps of data claiming to be the actual AshleyMadison database […]