Entries with this tag mention the discovery and describe the behavior of specific malicious programs.

Photo by Pierre Bamin on Unsplash

Felipe Ruiz

Watch out for keylogging/keyloggers

Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.

Photo by Jez Timms on Unsplash

Jason Chavarría

How does this clever Linux Trojan operate?

Reportedly, the last six months have seen a 254% surge in this Linux Trojan's activity. Read this post to learn what it is and what should be done about it.

Photo by engin akyurt on Unsplash

Felipe Ruiz

Highlights since just before the Russian invasion

This blog post provides you with a timeline of some cybersecurity highlights since shortly before Russia invaded Ukraine up to this point.

Photo by Rostislav Artov on Unsplash

Felipe Ruiz

The emergence of WhisperGate as the first worrying sign

Although Russia has not invaded Ukraine so far, cyberattacks attributed to that world power have again been reported and could escalate into a cyberwar.

Photo by Clark Van Der Beken on Unsplash

Jason Chavarría

Clues in the investigation of cyberattacks

We describe the kinds of technical traces left in the phases of a cyberattack and talk about how they may help the attribution process.

Photo by Markus Spiske on Unsplash

Jason Chavarría

Emotet may be back for the crown as king of malware

Emotet reigned as the most dangerous malware before the shutdown of its servers earlier this year. Unfortunately, this month has seen its reappearance.

Photo by Markus Winkler on Unsplash

Jason Chavarría

Android devices are catching FluBot and TangleBot

Read this post to learn about two Android malware campaigns. FluBot fools its victims using clever lures and TangleBot can be used to spy on the victims.

Photo by Icons8 Team on Unsplash

Felipe Ruiz

Find out about LockBit, now in its menacing 2.0 version

In this post, you'll learn in general terms what LockBit ransomware is, what its characteristics are and why it can pose a significant threat to your business.

Photo by Roi Dimor on Unsplash

Felipe Zárate

The spyware that threatens the world

In this post, we will look at the software everyone is talking about: Pegasus.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.