The Pakistan-based advanced persistent threat (APT) actor known as Transparent Tribe used a two-factor authentication (2FA) tool used by Indian government agencies...
The malware called OriginLogger has recently been dissected in detail by security experts from Palo Alto Networks Unit 42. It is believed...
Threat hunters have shed light on the tactics, techniques, and procedures embraced by an Indian-origin hacking group called Patchwork as part of...
Originally, O.MG Cable was introduced in 2019. In 2019, at DEFCON, an IT security researcher going by the online handle of MG...
Picking up the best match for our needs was never as tough as it is these days. The market is flooded with...
A simple reverse shell written in python 3.7 just for fun. Actually it supports Windows and Linux OS and integrates some...
The EvilGnomes Linux malware has been linked to infamous Russian threat actors from the Gamaredon Group. The IT security researchers at Intezar...
The Hong Kong Special Administrative Region in China, through its Privacy Commissioner, Stephen Kai-yi Wong has publicly disclosed a report containing more...
If you have downloaded the VSDC multimedia editing software between late February to late March this year, there are high chances that...
Password Managers aren’t as secure as you might assume – Security researchers claim that hackers can steal master passwords in PC memory....
Google has left no stone unturned in preventing malware and banking trojan from invading the applications uploaded on its official Play Store....
The holiday season is considered as a season for giving, however, in the age of Information when data is considered wealth, all...
Researchers discovered new Virobot Ransomware that distributed along with botnet futures mainly focusing on victims based on the United States. Attackers using spam email...
Apple Hacking Tools Double the Cost of Other Brands on Dark Web. There was a time when hackers needed to be really...
Yes, malware in Android apps aimed at Windows devices. Palo Alto Networks’ researchers have made a startling new discovery that nearly 145...
Newly Discovered Android-based MysteryBot Trojan launches various attack such as overlay, keylogger, and Ransomware in a single attack to perform various malicious...
Cybercriminals are quite innovative, to be honest; they are always coming up with unique ways of exploiting Windows-based systems. According to the...
A technique widely used to avoid hacking a computer is to isolate it completely from the network, known as air-gapped. This technique...
A Patched remote code execution Microsoft Office Vulnerability ( CVE-2017-11882) abusing again and using it for spreading a variety of Malware such as FAREIT, Ursnif...
Over 2,000 WordPress sites are infected with a malicious script that can deliver both a keylogger and the in-browser cryptocurrency miner CoinHive....
At the beginning of October 2017, we discovered new Android spyware with several features previously unseen in the wild. In the course...