[email protected] +603-2181 3666
Extol Threat Intelligent Notification

For a long time the Winnti group had been considered as a Chinese threat actor targeting gaming companies specifically. Recently, we’ve seen information indicating that the scope of targets can be wider and is no longer limited to the entertainment business. We actually track samples of Winnti malware all the time, but so far we haven’t […]

Poweliks Trojan
June 22, 2015

On the subject of malware, there is a new one in town. Well, not exactly new as it was first discovered in August 2014. What is new is that it is now being used in conjunction with ransomware to target consumers.   Poweliks is emerging as an adware (see Definition) click-fraud that is distributed via […]

IT News

A database supposedly from a sample of information stolen in the much publicized hack at the Office of Personnel Management (OPM) has been making the rounds in the cybercrime underground, with some ne’er-do-wells even offering to sell it as part of a larger package. But a review of the information made available as a teaser indicates […]

Unlike conventional World Wide Web technologies, the Tor Darknet onion routing technologies give users a real chance to remain anonymous. Many users have jumped at this chance – some did so to protect themselves or out of curiosity, while others developed a false sense of impunity, and saw an opportunity to do clandestine business anonymously: […]