A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software to deliver a previously unknown...
We all know passwords and firewalls are important, but what about the invisible threats lurking beneath the surface of your systems? Identity...
Pirated applications targeting Apple macOS users have been observed containing a backdoor capable of granting attackers remote control to infected machines. “These...
Tactical and targeting overlaps have been discovered between the enigmatic advanced persistent threat (APT) called Sandman and a China-based threat cluster that’s...
Spyware masquerading as modified versions of Telegram have been spotted in the Google Play Store that’s designed to harvest sensitive information from...
Public Wi-Fi, which has long since become the norm, poses threats to not only individual users but also businesses. With the rise...
The use of illegal software has been under circulation ever since there have been torrents and cracked software. Recent reports show that...
2022 was the year when inflation hit world economies, except in one corner of the global marketplace – stolen data. Ransomware payments...
A recently discovered cyber espionage group dubbed Worok has been found hiding malware in seemingly innocuous image files, corroborating a crucial link...
Do you find reports of spy cams found in vacation rentals unsettling? Try these tips for spotting hidden cameras to put your...
A threat cluster with ties to a hacking group called Tropic Trooper has been spotted using a previously undocumented malware coded in...
As many as seven malicious Android apps discovered on the Google Play Store masqueraded as antivirus solutions to deploy a banking trojan...
A trip into the dark corners of Telegram, which has become a magnet for criminals peddling everything from illegal drugs to fake...
The former Navy Nuclear engineer and his wife used a bubble gum package and peanut butter sandwich to hide SD card with...
Mac computers often have hidden files that you can’t see. Find out the practical ways to find and view the articles with...
The Whitehat hacker and IT security researcher Marcus Hutchins, who saved the world from the WannaCry ransomware attack, has shared simple yet...
Another in our occasional series demystifying Latin American banking trojans
Many users ignore it, but by using their laptop camera or any other camera with a WiFi connection, their MAC address will...
ESET researchers reveal the modus operandi of the elusive InvisiMole group, including newly discovered ties with the Gamaredon group
Just a nice persistence trick to confuse DFIR investigation. Uses NtSetValueKey native API to create a hidden (null terminated) registry key. This...
It’s not just you, we all want to know why the Mac system takes up so much of space. I am curious...