Researchers have spotted Triangulum, a previously known threat actor making a comeback with new Android malware that is now being sold on...
The new variant of Agent Tesla is equipped with many sophisticated features, including credential-stealing modules. According to senior threat researcher at...
Inputs To Mail. Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail. Purpose of the project is testing the security of information...
KeyLogger for Linux Systems. Features Runs on GUI systems or CLI Sending data by email Dependencies curl libx11-dev (Debian-Based) libX11-devel (RHEL-Based)...
Picking up the best match for our needs was never as tough as it is these days. The market is flooded with...
Cybersecurity threats don’t always come from outside, as they are often caused by employees or people with some access to a company’s...
Researchers discovered a previously unknown fully-featured Python RAT called”PiXie” escalate the Windows admin privilege to the ransomware in the healthcare and education...
A simple reverse shell written in python 3.7 just for fun. Actually it supports Windows and Linux OS and integrates some...
The EvilGnomes Linux malware has been linked to infamous Russian threat actors from the Gamaredon Group. The IT security researchers at Intezar...
If you have downloaded the VSDC multimedia editing software between late February to late March this year, there are high chances that...
Password Managers aren’t as secure as you might assume – Security researchers claim that hackers can steal master passwords in PC memory....
Google has left no stone unturned in preventing malware and banking trojan from invading the applications uploaded on its official Play Store....
The holiday season is considered as a season for giving, however, in the age of Information when data is considered wealth, all...
Researchers discovered new Virobot Ransomware that distributed along with botnet futures mainly focusing on victims based on the United States. Attackers using spam email...
Apple Hacking Tools Double the Cost of Other Brands on Dark Web. There was a time when hackers needed to be really...
Yes, malware in Android apps aimed at Windows devices. Palo Alto Networks’ researchers have made a startling new discovery that nearly 145...
Newly Discovered Android-based MysteryBot Trojan launches various attack such as overlay, keylogger, and Ransomware in a single attack to perform various malicious...
Cybercriminals are quite innovative, to be honest; they are always coming up with unique ways of exploiting Windows-based systems. According to the...
A technique widely used to avoid hacking a computer is to isolate it completely from the network, known as air-gapped. This technique...
A Patched remote code execution Microsoft Office Vulnerability ( CVE-2017-11882) abusing again and using it for spreading a variety of Malware such as FAREIT, Ursnif...
Over 2,000 WordPress sites are infected with a malicious script that can deliver both a keylogger and the in-browser cryptocurrency miner CoinHive....