Friday, June 14, 2024

7 Malicious Apps Reappeared on the Play Store Using Google Icons

0
Seven malicious apps reappeared in Play store with slightly different names under a new publisher account.Those malicious apps are already reported to Google by...

Hackers Started Exploiting the Unpatched Windows Task Scheduler Zero Day Flaw using Malware

0
Malicious Hackers created a malware with an exploit for an unpatched Microsoft Zero-day flaw that was revealed a few days before by Belgium security...

macOS Malware Added New Weapons to Its Arsenal To Attack Google Chrome & Telegram

0
The security researchers of Trend Micro have recently detected that the XCSSET malware that has been outlined to attack the macOS operating system got...

GhostTeam – Android Malware Stealing Your Facebook Credentials

0
A New Android Malware GhostTeam found in Google PlayStore that is capable of stealing Facebook credentials and also it used some social engineering technique to...

Dvmap – First Ever Android Rooting Malware with Code Injection Capabilities

0
Trojan Dvmap distributed through the Google Play Store, uses various exceptionally dangerous methods, including patching system libraries. It installs malicious modules with different functionality...
Balkans

Hackers use Backdoor and Trojan to Attack Financial Departments of Organizations

0
Hackers use backdoor and remote access trojan that let attackers gain complete remote control over the compromised computer. The campaign particularly targets the financial...

Nascent Malware Attacking npm, PyPI, and RubyGems Developers

0
Phylum analyzes source code and metadata for all registry-pushed packages. This year, in millions of packages they are aiming to examine nearly a billion...

Researchers bypassed Windows 10 Lock Protection and Access Cortana Voice Commands that leads to...

0
The researcher discovered a new flaw in Windows 10 lock Protection that allows attackers to access the Cortana Voice Commands in the locked system...

Researchers Uncover DiceLoader Malware Used to Attack Corporate Business

0
An intrusion set called FIN7 has been known to be operating since 2015 and is composed of Russian-speaking members. This threat group also pretends...
U.S. Recovered $30 Million From North Korean Hackers

U.S. Recovered $30 Million From North Korean Hackers

0
Cryptocurrency stolen by North Korean hackers has been seized by the FBI and private investigators for a value of approximately $30 million. There has...

Managed WAF protection

Website

Recent Articles