Malware

Entries with this tag mention the discovery and describe the behavior of specific malicious programs.

Photo by Pierre Bamin on Unsplash

Felipe Ruiz


Watch out for keylogging/keyloggers

Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.

Photo by Jez Timms on Unsplash

Jason Chavarría


How does this clever Linux Trojan operate?

Reportedly, the last six months have seen a 254% surge in this Linux Trojan's activity. Read this post to learn what it is and what should be done about it.

Photo by engin akyurt on Unsplash

Felipe Ruiz


Highlights since just before the Russian invasion

This blog post provides you with a timeline of some cybersecurity highlights since shortly before Russia invaded Ukraine up to this point.

Photo by Rostislav Artov on Unsplash

Felipe Ruiz


The emergence of WhisperGate as the first worrying sign

Although Russia has not invaded Ukraine so far, cyberattacks attributed to that world power have again been reported and could escalate into a cyberwar.

Photo by Clark Van Der Beken on Unsplash

Jason Chavarría


Clues in the investigation of cyberattacks

We describe the kinds of technical traces left in the phases of a cyberattack and talk about how they may help the attribution process.

Photo by Markus Spiske on Unsplash

Jason Chavarría


Emotet may be back for the crown as king of malware

Emotet reigned as the most dangerous malware before the shutdown of its servers earlier this year. Unfortunately, this month has seen its reappearance.

Photo by Markus Winkler on Unsplash

Jason Chavarría


Android devices are catching FluBot and TangleBot

Read this post to learn about two Android malware campaigns. FluBot fools its victims using clever lures and TangleBot can be used to spy on the victims.

Photo by Icons8 Team on Unsplash

Felipe Ruiz


Find out about LockBit, now in its menacing 2.0 version

In this post, you'll learn in general terms what LockBit ransomware is, what its characteristics are and why it can pose a significant threat to your business.

Photo by Roi Dimor on Unsplash

Felipe Zárate


The spyware that threatens the world

In this post, we will look at the software everyone is talking about: Pegasus.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.