Malware

Researchers Found Goldluck Malware Infecting iPhone Apps 1

Researchers Found Goldluck Malware Infecting iPhone Apps

The Goldluck malware has been around for more than a year. The malware basically gave hackers privileges which allowed them to send premium messages and earn money. Historically, Goldluck has…

Read More
MobSTSPY Spyware Finds Its Way Into Google Play

MobSTSPY Spyware Finds Its Way Into Google Play

Spyware camouflaged as Android applications has found its way into the Google Play store, and a part of the malicious applications being downloaded multiple times by users across the world…

Read More
Open EDR
Emotet 1

After Germany, Kenya Is Now Dealing with Emotet Malware Infection

According to Communication CAK (Communication Authority of Kenya) Emotet malware has penetrated the East African country, Kenya. All publicly institutions, including the vulnerable banking sector are warned, they need to…

Read More
The Biggest Malware Threats To Businesses in 2019

The Biggest Malware Threats To Businesses in 2024

Trends in malware in 2023 and bad actors are increasing their portions of life and commerce to an electronic medium. We are going to see how the digital domain itself…

Read More
Shamoon Malware from 2016 2017 Evolved With File Wiping Capability Targets Middle East Countries

Shamoon Malware from 2016-2017 Evolved With File Wiping Capability, Targets Middle East Countries

McAfee, the Intel subsidiary antimalware vendor has recently disclosed the evolution of the Shamoon malware, with Europe and the Middle East as the two most infected regions. The newer version…

Read More
BJC Healthcare Another Healthcare Provider Becomes A Malware Victim 2

BJC Healthcare: Another Healthcare Provider Becomes A Malware Victim

BJC HealthCare, a non-profit healthcare firm headquartered in St. Louis Missouri became a victim of malware which is now being blamed for the loss of personally identifiable information, including credit…

Read More
A Nastier Use of Memes Discovered To Remote Control A Trojan Horse

A Nastier Use of Memes Discovered, To Remote Control A Trojan Horse

Security experts have been using isolated real-world systems in order to forensically study malware for ages. These ‘honey pots’ are very productive instruments for developing countermeasures against malware. The quarantined…

Read More
New Paypal Trojan Detected In A Battery Saver App

Never Download Apps from 3rd Party App Stores: New Paypal Trojan Detected In A Battery Saver App

Since 2008, Google has been warning the public to only source their apps from the official Google Play Store and not from 3rd party unknown app suppliers. Cybersecurity issues with…

Read More
Banking Trojan Made in Brazil

Banking Trojan Made in Brazil? A Brief Look

For decades, malware, especially those that can be considered as ‘weaponized’ have been proven developed by state-actors. State-actors are country-hired hackers, with the purpose of developing weaponized software in order…

Read More
Mirai Botnet New Variant Takes Aim at x86 Linux Servers

Mirai Botnet New Variant Takes Aim at x86 Linux Servers

A new variant of the Mirai botnet now takes aim at the x86 Linux servers in enterprise networks. It was just a couple of years ago that the chaotic Mira…

Read More

Page 6 of 21

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register