Malware

FAQ – What are YARA Rules?

FAQ – What are YARA Rules?

YARA is a pattern matching framework. It is used to identify and classify malware and other IT Security threats. It has a long standing history in the IT security landscape…

Read more
What-is-the-Chamois-Botnet

What is the Chamois Botnet?

In March 2017 the Android security team had detected, analysed and eliminated a sophisticated botnet which was built on compromised apps that work together to power ad and SMS fraud.…

Read more
Eagle-Eye-T-Pre-Installed-Malware-02.06.2023 Instagram

Pre-installed Malware Being Found on Millions of Android Phones Out Of The Box With No Easy Fix

A worrying new development has surfaced in the Android world where phones are coming preinstalled with malware. often disguised as legitimate harmless apps these malicious apps post a security risk…

Read more
Threat Advisory EvilExtractor Malware Spikes In Europe and US

Threat Advisory – EvilExtractor Malware Spikes In Europe and US

Distributed through phishing campaigns, EvilExtrator malware attacks have increased in both Europe and the US. This malware can harvest different types of data, including ones browser history, passwords, and cryptocurrency…

Read more
Who are the Hacking Group Labyrinth Collima

Who are the hacking group LABYRINTH CHOLLIMA

Labyrinth Chollima, active since at least 2018 and originating from North Korea and also known as APT37 has been linked to the North Korean Government. (more…)

Read more