The suspected Pakistan-linked threat actor known as Transparent Tribe is using malicious Android apps mimicking YouTube to distribute the CapraRAT mobile remote...
Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems. Jamf Threat Labs, which made...
A new variant of the macOS malware tracked as UpdateAgent has been spotted in the wild, indicating ongoing attempts on the part...
Cybersecurity researchers have shed light on an actively maintained remote access trojan called DCRat (aka DarkCrystal RAT) that’s offered on sale for...
The IT security researchers at Proofpoint have discovered a new malware campaign in which threat actors from a group called TA544 are...
GriftHorse malware uses malicious apps to subscribe victims to premium services that cost them $42 (£30 –€36) per month. The IT security...
The total amount of data collected by the malware includes nearly 26 million login credentials holding 1.1 million unique email addresses, 2...
According to reports from digital forensics experts, the dangerous hacker group known as Platinum has announced the release of Titanium, a new...
A new Windows malware in Play – SystemBC. While finding and removing malware on your computer system may indeed be a joyous...
If you are someone who relies on “Windows Defender” on Windows 10 to protect your device from malware threats, you should know about...
Hackers broke the file server of the Pale Moon browser project and attacked the previous version of the browser with malicious software....
It may be irritating, your screen is full of ads, and when you close one, another appears. Yes, we are talking about...
Sometimes known as computer forensics, data forensics refers to the process of investigating digital data or programs in order to find out...
Sophisticated threats are Evolving with much more advanced capabilities and giving more pain for analysis even evade the advanced security software such...
Just like the operating system itself, application software needs to be updated regularly in order to prevent the possibility of fixed security...
By using the bug, hackers are desperately dropping persistent malware through generic trojan on systems using the old version of WinRar. McAfee security firm’s...
Various groups of cyber criminals are exploiting a series of zero-day vulnerabilities in Counter Strike 1.6, an old videogame, to spread the...
A new unique campaign abuses system native OS process and security software to steal passwords and personal information. Threat actors disguise the...
In a blog post, Cybereason’s Nocturnus Research Team has uncovered a new strain of Astaroth Trojan which infects systems by exploiting processes...
An energy company suffered the theft of sensitive information because an employee downloaded a malware disguised as a videogame According to network...
The US-Cert team issued an alert for advanced Emotet banking malware attack that targets governments, private and public sectors in the most...