JanelaRAT: Remote Access Trojan - A Portuguese Malware
Discover the alarming threat posed by JanelaRAT, a new financial Trojan targeting Latin Am...
GigaBud Rat : Android Banking Trojan Records Screen To Steal Personal...
Learn about the Gigabud RAT, a new banking Android Trojan targeting credit institution cli...
Android malware uses versioning to bypass Play Store scanners
How Cybercriminals Exploit Android Devices. Learn how cybercriminals slip dangerous malwar...
Malicious WebAPK (PWA): A New Threat Exploiting Android Devices
Beware of WebAPK: Android's new threat. Attackers exploit WebAPK to install malicious apps...
Blacklotus Windows UEFI Malware Source Code Leaked From Darkweb Forum
The Blacklotus Windows UEFI malware has had a portion of its source code posted on GitHub....
SilentBob: Team TNT Malware Campaign Targeting Misconfigured Servers
The Legendary TeamTNT Strikes Again In To Game After 2 Years! In This Article You Will Lea...
Chinese Hackers Exploiting Google Play Store For Spreading Their Malwa...
Cybersecurity experts from Pradeo revealed two malicious file management and data recovery...
Chinese Hackers Attacking European Foreign Ministries And Embassies Wi...
An unknown hacker group suspected of having links to the Chinese Communist Party attacked...
EarlyRat : Hidden Malware Family Exposed By North Korean Hackers
Kaspersky Lab researchers have uncovered a previously undocumented malware family and iden...
ThirdEye: A New Malware Targeting The Windows systems
New Windows malware capable of stealing sensitive data from infected computers has been di...
Anatsa Banking Malware Spreads On Google Play Store
In March 2023, a new Anatsa Android banker campaign was launched, this time targeting fina...
Mockingjay: Bypass EDR Obstacles And Executes Malicious Code
A new way to inject code into legitimate processes, dubbed "Mockingjay" by researchers, co...
UnderGround Fluhorse Android Trojan steals SMS to intercept 2FA codes
In this article, explore the intriguing world of the Fluhorse Android malware, developed u...
Bumblebee and IcedID Trojans Clash with PindOS: Unraveling the Tactics...
Classic BumbleBee Loader a Malware Dropper From Underground Blackhat Hackers Now Exploit P...
Darkweb Malware "Mystic Stealer" is Rapidly Spreading Among Attackers
In April of this year, a new type of malicious software began to spread over the network,...
Hackers Exploit AWS S3 Stores To Spread Malicious Code via npm Package...
Cybercriminals have found a way to inject their malicious code into npm packages without c...
Japanese Cryptocurrency Exchange Hit by JokerSpy Attack
Unidentified hackers have hacked a Japanese cryptocurrency exchange and installed JokerSpy...
New malware Fractureiser threatens the safety of Minecraft players
The new "Fractureiser" malware, capable of stealing information from Minecraft players' co...
Stealthy New Trojan SeroXen RAT Bypasses Antiviruses and Gives Hackers...
Introduction In the vast landscape of cyber threats, a new remote access Trojan has emerg...
DogeRAT: A New Mobile Remote Access Trojan Targeting Android Users in...
Cybersecurity experts have recently discovered a new mobile remote access Trojan (RAT) nam...
AhRat Android Trojan Infects 50,000 Smartphones via Google Play Store
Trojan in Google Play Store, hidden in a screen recording app. Specialists at ESET highlig...
Researchers uncover details of how Predator spyware works
Explore Predator, a commercial Android spyware, and Alien, its downloader. Learn about the...