Trojan

Mobile Banking Malware “Svpeng” Working as a Keylogger and Steals Contacts and Call...

New Banking Malware called "Svpeng" -Trojan-Banker.AndroidOS.Svpeng.ae Discovered with New Advance Futures that working as Keylogger and steals sensitive information such as Entering texts, to send SMS, Call logs and Contacts Details from victims Mobile. Taking Advantages of accessibility services and abusing...

Domain Fronting – A New Technique For Hiding Malware Command and Control (C2) Traffic...

A New Technique called "Domain Fronting" Discovered that allow cyber criminals to hide the command & control Networks Traffic within a CDN. It act as a mask for  C&C networks and widely used advanced Technique for Malware Evasion. "A content delivery...

Critical Cisco security Authentication Bypass Vulnerability leads to hack thousands of home routers

Remote unauthenticated control over a vulnerable ISP's gear, could allow an attacker to log into the software as an administrator and remotely take control of thousands upon thousands of customers' home routers, broadband gateways and similar boxes. Cisco said ,The...

Researchers Find Backdoor Account in 80 Different “SONY” IP...

  Researchers in Austria have unearthed a pair of backdoor accounts in more than 80 different IP camera models made by Sony Corp.     Separately, Israeli security experts have discovered trivially exploitable weaknesses in nearly a half-million white-labeled IP camera models that are not currently...

Global Cyber Security Firm “Comodo Threat Research Labs” (CTRL) Detects New Family of Sophisticated...

Comodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”. It is a sophisticated Banking Trojan that can bypass the standard security protocols of an Android operating system (version 6),...

Most Popular

Recommended