Skip to content
CyberByte Blog | Security News | How to Tutorials | Download Free Antivirus | Antivirus for Mac | Antivirus for Windows | Mac Antivirus | Windows Antivirus | Penetration Testing | Ethical Hacking | GDPR

CyberByte Blog | Security News | How to Tutorials | Download Free Antivirus | Antivirus for Mac | Antivirus for Windows | Mac Antivirus | Windows Antivirus | Penetration Testing | Ethical Hacking | GDPR

CyberByte Blog | Security News | How to Tutorials | Download Free Antivirus | Antivirus for Mac | Antivirus for Windows | Mac Antivirus | Windows Antivirus | Penetration Testing | Ethical Hacking | GDPR

  • ABOUT US
  • SERVICES
    • OUR SERVICES
    • PENETRATION TESTING
    • MALWARE ANALYSIS
    • INCIDENT RESPONSE
  • SOFTWARE
    • ANTIVIRUS FOR MAC
    • ANTIVIRUS FOR WINDOWS
  • NEWS
    • WINDOWS MALWARE
    • MAC MALWARE
    • SECURITY NEWS
    • WEEK REPORT
    • MALWARE ANALYSIS
  • MEDIA RELATIONS
    • RECENT MEDIA
    • MEDIA ARCHIVE
  • PRIVACY POLICY
  • CONTACT

Category: Malware Analysis

As ransomware use falls, crypto-miners are rising

February 5, 2018 blog Malware Analysis, Security News, Windows Malware

Our cyber security team has two news: the good one is that because cybersecurity software is getting better an better ransomware use is decreasing, the bad one is that cybercriminals are shifting their attention to cyber coin miners. And it has logic because there is no intermediary and the profit[…]

Read more

New DDoM tool offers everyone the chance to be informed about the latest malware software available in cyberspace

January 23, 2018 blog Malware Analysis, Security News

New DDoM tool offers everyone the chance to be informed about the latest malware software available in cyberspace If anyone wants to become better regarding malware and C&C servers or is just curious on how do they work, our cybersecurity team will explain to everybody interested how and where can[…]

Read more

Zyklon malware can do a lot of damage to your device

January 19, 2018 blog Malware Analysis, Security News

Zyklon malware can do a lot of damage to your device Cybercriminals deliver Zyklon HTTP malware through Microsoft Office. Our cybersecurity team discovered that the cybercriminals are using new vulnerabilities present in Microsoft Office. The Zyklon malware code can be found very easily on the internet because is free. This[…]

Read more

Recent Posts

  • RSA Security conference’s mobile app is very unsafe.
  • Teen who hacked Ex-CIA Director John Brennan will stay two years in a state penitentiary
  • Cybercrime economy makes 1.5 Trillion dollars every year
  • Over 20 Million Installed Malicious Ad Blockers From Chrome Store
  • ‘Trustjacking’ can now be used to attack iPhones
  • New VBScript malware adds RAT capabilities to a persistent loader
  • How hackers monetize the stolen data
  • Hackers hijack router DNS to distribute Android banking trojan
  • Fake Android apps used for surveillance can be found in Google Play Store
  • Crooks can now steal your keyless car

Archives

  • April 2018
  • March 2018
  • February 2018
  • January 2018
Copyright CyberByte - all rights reserved