March 3rd, 2021 | 🕒
https://www.ispeech.org/text.to.speech Indian authorities continue their investigation of the possibility that the Chinese threat actor Recorded Future calls “RedEcho” compromised portions
June 3rd, 2020 | 🕒
iSpeech.org Security researchers discovered a new Ursnif malware delivery campaign leveraging Excel 4.0 macro functionality. In an analysis of one
April 8th, 2020 | 🕒
iSpeech Security researchers observed that a new Ursnif attack campaign replaced PowerShell with mshta as a means to distribute the
March 18th, 2020 | 🕒
TTS Demo Security researchers detected an Ursnif campaign that leveraged a new infection chain to target users based in Italy.
January 24th, 2020 | 🕒
https://www.ispeech.org Cybersecurity researchers have observed a recent trend of Ursnif malware spam specifically targeting German nationals using a spam email
August 14th, 2019 | 🕒
iSpeech.org Attackers took a sophisticated dropper and disguised it as a fake DHL shipping invoice to distribute Ursnif malware. Deep
August 12th, 2019 | 🕒
https://www.ispeech.org/text.to.speech Security researchers came across a new Ursnif malware campaign that used multiple anti-analysis techniques to avoid detection. In summer
May 23rd, 2019 | 🕒
https://www.ispeech.org/text.to.speech URLZone Morphs Into a Downloader for Ursnif Researchers have discovered a malware campaign targeting Japan and combining phishing, steganography,
April 3rd, 2019 | 🕒
TTS How can malware rapidly change itself within seconds from one download to another? Read on to discover how Ursnif
June 28th, 2018 | 🕒
iSpeech Malware researchers from CSE Cybsec ZLab discovered a missed link between the Necurs Botnet and a variant of the Ursnif trojan
June 27th, 2018 | 🕒
iSpeechA new improved version of the infamous Ursnif banking Trojan leverages Necurs botnet infrastructure targets Italian companies. The malware primarily
Gloss