Malware
Kaspersky Unveils Innovative Method to Detect Spyware on iOS Devices
In an era where digital privacy is continually under threat, the detection and prevention of spyware on our devices have never been more critical. Kaspersky, a leading cybersecurity firm, has…
Read moreUnveiling The Backdoored Free Download Manager: A Linux Malware Insight
The Discovery of Backdoored FDM Securelist's thorough analysis revealed that the compromised version of FDM were ingeniously engineered to infiltrate Linux operating systems. This backdoored variant of the software is…
Read moreDissecting The Tirada Malware Trojan
Trojans are similar to that of armies and actually behave in the same way. Armies usuallly send out the scouts first to survey the area and ensure all is ok.…
Read moreAndroid Devices Are Coming with an unkillable backdoor pre-installed out of the box
Worrying new is emerging that thousands of Android devices are coming with an advanced Triada malware already installed prior to the devices getting on the shelves of resellers. When buying…
Read moreFAQ – What are YARA Rules?
YARA is a pattern matching framework. It is used to identify and classify malware and other IT Security threats. It has a long standing history in the IT security landscape…
Read moreWhat is the Chamois Botnet?
In March 2017 the Android security team had detected, analysed and eliminated a sophisticated botnet which was built on compromised apps that work together to power ad and SMS fraud.…
Read morePre-installed Malware Being Found on Millions of Android Phones Out Of The Box With No Easy Fix
A worrying new development has surfaced in the Android world where phones are coming preinstalled with malware. often disguised as legitimate harmless apps these malicious apps post a security risk…
Read moreThreat Advisory – EvilExtractor Malware Spikes In Europe and US
Distributed through phishing campaigns, EvilExtrator malware attacks have increased in both Europe and the US. This malware can harvest different types of data, including ones browser history, passwords, and cryptocurrency…
Read moreWho are the hacking group LABYRINTH CHOLLIMA
Labyrinth Chollima, active since at least 2018 and originating from North Korea and also known as APT37 has been linked to the North Korean Government. (more…)
Read more