Monitor

A Banking Trojan Called “Ursnif” Using Mouse Moments for Evasion and Decryption From Virtual...

Bank Trojan called "Ursnif" using clever Trick to Evade sandbox Detection from the  Virtual Machine Environment by using mouse movements. New Futures has been embedded with...
CIA Malware Development Surveillance Project

Vault 7 Leaks : CIA Owned PoC Malware Development Surveillance Projects “UCL Under Raytheon”...

WikiLeaks Revealed CIA Surveillance Projects Documents "UMBRAGE Component Library(UCL)"  from CIA contractor Raytheon Blackbird Technologies which contains five secret Malware Development Related PoC(Proof-of-Concepts) with...
control devices functionalities and even hijack the devices

Record Audio and Video Silently with Obfuscated Android Backdoor – GhostCtrl

New Android malware variant GhostCtrl steals data, control devices functionalities and even hijack the devices. It is certainly a variant of commercially sold OmniRAT...

A Banking Trojan Called “QakBot ” Attack Thousands of Windows Active Directory and users...

An Existing Banking Trojan called "QakBot " attack Windows  Active Directory users and leads to locks out the thousands of Active Directory users which...
SambaCry Vulnerability Deploying Payloads Targeting IoT devices

SambaCry Vulnerability used in Deploying Payloads Targeting IoT devices Particularly NAS

Attackers using the SambaCry vulnerability to target older versions of Samba(3.5.0) to upload and execute the malicious payload. SambaCry Vulnerability(CVE-2017-7494) have the similarities of...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security