Security researchers from ESET identified the sophisticated hacker group Turla added new malware to its arsenal. It attempts victims to …
36 Malicious Android Apps Removed From Google Play Store that Mimics as Famous Security Tools
Several malicious Android Apps removed from Google play store that posed as legitimate security tools and different category of android …
LightsOut – Malicious Flashlight Apps on Google Play with Nearly 7.5 Million Downloads
A new adware spotted in Google play contains scripts to overrides the user decision and disable ads outside of legitimate …
Dangerous Android Malware Targets 232 Banking Apps (Axis,HDFC,SBI,ICICI) and Cryptocurrency Apps
A new Android banking Trojan identified targeting more that 232 mobile banking apps and major Indian banks mobile app. The …
Dreambot Banking Trojan Delivered via Resume-Themed Email
Dreambot banking Trojan which is a variant of Ursnif spreading via resume themed email, it is one of the most …
New “GnatSpy” Mobile Malware Stealing data Such as Images, Text messages, Contacts, and Call History
A newly emerging mobile malware GnatSpy capable of abusing infected mobile and stealing various type of data such Images, Text …
New Android Malware Physically Destroying your Phone by Running Cryptocurrency miner
Nowadays Trojanized Android apps evolving rapidly in play store and continuously targetting users, a new malware strain Trojan.AndroidOS.Loapi spotted consist …
New Malware “TRITON” Manipulate and Shutdown the Industrial Control Systems
A dangerous malware family called “TRITON” distributing to attack Industrial control systems that leads to Perform an emergency shutdown the …
Using n1n3 to Simulate an Evasive Fileless Malware – Proof Of Concept
Fileless malware are types of malicious code used in cyber attacks that don’t use files to launch the attack and …
Linux.ProxyM used to Launch Numerous Hacking Attempts against Websites through Various Methods (SQL injections, XSS, LFI)
Linux.ProxyM malware was well known for infecting almost any Linux devices which include routers, set-top boxes, and other equipment. It …