In 2015, Beijing based laptop manufacturer and seemingly reliable technology company Lenovo made headlines that its 750,000 laptops had pre-installed adware called...
The trojan also installs a rootkit and another malware variant that can lead to denial-of-service conditions Perhaps the malware variants that affect...
Trickbot, a Banking Trojan that involved various cyber attacks especially target the banking networks, now distributing to target the POS services and...
A new Mobile malware family called Rotexy, launched over 7000 attacks in wide within 3 months of the period from August to October...
Some Mac apps are so persistent that you can’t use traditional methods to remove them. Even if you do, there will always...
The malicious program could be a cryptocurrency miner, or an adware The Android mobile operating system is one of the most widely...
The real world is a jungle; it is really is still the survival of the fittest even after hundreds of thousands of...
Android is one of the most used mobile operating systems in the world and that makes it a lucrative target for malicious...
Hackers using Google Adwords & Google Sites to spread malware VisionDirect, one of Europe’s largest online optical retailer that deals with contact...
Daniel’s Hosting, one of the largest hosting service providers on Dark Web has come under a massive cyber attack forcing its website along...
Recent research revealed that most of the ATM’s around the world are vulnerable to compromise and cash out from the ATM by...
Today, there are two tried and tested ways for cybercriminals to effectively earn a lot of income. The first one is what...
“DarkGate” malware uses Akamai, AWS DNS records and multiple payloads for cryptomining, credential theft and endpoint takeover. A sophisticated malware campaign has...
When news broke about Cambridge Analytica, the Internet went into a frenzy: “How could Facebook do this!” “Facebook should be made accountable!” Besides...
2017 was a year of ransomware, primarily the WannaCry malware that made $4 billion in profits from the ransom payments of its...
Malware hidden inside Simple Call Recorder app tricks user in downloading and installing an additional app. Security researcher Lukas Stefanko discovered the...
Update your GDPR Compliance plugin right now. Security researchers have identified a critical vulnerability in the popular WP GDPR Compliance plugin assisting over...
The Lazarus hackers have been using the FastCash Trojan on obsolete AIX servers to steal tens of millions of dollars The researchers...
The South Korean hackers’ were arrested for injecting malware in the computer of over 6,000 people. The Korean National Police Agency Cyber...
There are several malicious apps on the Google Play Store that can steal your bank info like login credentials and send fake...
BlobRunner is a simple tool to quickly debug shellcode extracted during malware analysis. BlobRunner allocates memory for the target file and jumps...