Kaspersky Unveils Innovative Method to Detect Spyware on iOS Devices

In an era where digital privacy is continually under threat, the detection and prevention of spyware on our devices have never been more critical. Kaspersky, a leading cybersecurity firm, has…

Read more

Unveiling The Backdoored Free Download Manager: A Linux Malware Insight

The Discovery of Backdoored FDM Securelist's thorough analysis revealed that the compromised version of FDM were ingeniously engineered to infiltrate Linux operating systems. This backdoored variant of the software is…

Read more

Dissecting The Tirada Malware Trojan

Trojans are similar to that of armies and actually behave in the same way. Armies usuallly send out the scouts first to survey the area and ensure all is ok.…

Read more

Android Devices Are Coming with an unkillable backdoor pre-installed out of the box

Worrying new is emerging that thousands of Android devices are coming with an advanced Triada malware already installed prior to the devices getting on the shelves of resellers. When buying…

Read more
FAQ – What are YARA Rules?

FAQ – What are YARA Rules?

YARA is a pattern matching framework. It is used to identify and classify malware and other IT Security threats. It has a long standing history in the IT security landscape…

Read more

What is the Chamois Botnet?

In March 2017 the Android security team had detected, analysed and eliminated a sophisticated botnet which was built on compromised apps that work together to power ad and SMS fraud.…

Read more
Eagle-Eye-T-Pre-Installed-Malware-02.06.2023 Instagram

Pre-installed Malware Being Found on Millions of Android Phones Out Of The Box With No Easy Fix

A worrying new development has surfaced in the Android world where phones are coming preinstalled with malware. often disguised as legitimate harmless apps these malicious apps post a security risk…

Read more
Threat Advisory EvilExtractor Malware Spikes In Europe and US

Threat Advisory – EvilExtractor Malware Spikes In Europe and US

Distributed through phishing campaigns, EvilExtrator malware attacks have increased in both Europe and the US. This malware can harvest different types of data, including ones browser history, passwords, and cryptocurrency…

Read more
Who are the Hacking Group Labyrinth Collima

Who are the hacking group LABYRINTH CHOLLIMA

Labyrinth Chollima, active since at least 2018 and originating from North Korea and also known as APT37 has been linked to the North Korean Government. (more…)

Read more