Thursday, March 28, 2024

A Mobile Ransomware Called “LeakerLocker” Found in Google Play Store Which Leaks Phone’s...

0
Mobile Ransomware called LeakerLocker Found in Google Playstore which infect the Android Mobile user and steals the information such as contact Phone numbers, Phone...

Beware : Super Mario Run Android game is Actually Malware. Don’t Download it

0
Super Mario Run is anticipated to dispatch in the Google Play Store in the coming weeks, after beforehand going live on iOS on December...

NSA Malware “EternalBlue” Successfully Exploit and Port into Microsoft Windows 10

0
A Malware called "EternalBlue"  Vulnerability Successfully port the exploit to Microsoft Windows 10 by the Security Researchers which has been only affected earlier with...

Beware: New Google Play Store Android Malware called “Judy” Infected Around 8.5 to...

0
A New Android Malware Called "Judy" found in google play store infected 41 Apps which all are created by a Korean company. This "Judy"...

Vault 7 Leaks : CIA Malware “OutlawCountry” Controls Linux Machine and Redirect the Victims...

0
WikiLeaks Revealed another Secret Document of  CIA Malware called "OutlawCountry" that targets Linux Running Machines which Control and Redirect all outbound network traffic on...

Dvmap – First Ever Android Rooting Malware with Code Injection Capabilities

0
Trojan Dvmap distributed through the Google Play Store, uses various exceptionally dangerous methods, including patching system libraries. It installs malicious modules with different functionality...

New OSX/Dok Malware Targeting macOS Users to Steal Banking Credentials by Cloning Major Bank...

0
A New MacOS Malware "OSX/Dok" Discovered to Steal Banking Credentials by cloning major Banking website which leads victims to install the Malicious Application into...

Malicious Android ads leads to Automatically Download and Install Apps that Contain Malware in...

0
Malicious Android Apps are growing rapidly and it used to target victims in Many ways. Spreading Malware through malvertising campaign in Popular Forum Leads...

CIA Hacking Tool “Brutal Kangaroo” Revealed to Hack Air-Gapped Networks by using USB Thumb...

0
Wikileaks Revealed Next CIA Hacking Tool called "Brutal Kangaroo" under Vault 7 Projects that Consists of 4 Powerful Malware Components which targets closed networks...

Dangerous Malware detected that is capable of Controlling Electric Power Systems

0
In 2016 A power lockout in Ukraine's capital Kiev last was caused by a cyber attack and this malware can do the same. Security...

Managed WAF protection

Website

Recent Articles