Spyware

Malware-as-a-service – Adwind Malware Attack Utilities Industry Via Weaponized PDF File

Researchers discovered a new wave of a phishing campaign that bypassing the Microsoft APT protection and delivery the Adwind malware…

5 years ago

Israel NSO Group’s Updated Cyber Weapon Can Spy Apple, Google, Facebook, Amazon, and Microsoft Cloud Servers Data

An Isreali cybersecurity company known as NSO Group developed spyware now spy cloud data from the servers of Apple, Google,…

5 years ago

7 Spyware Apps with Over 130,000 Installation Found on Google Play

Google has removed 7 Stalkerware Apps from Google play that secretly spy on other users. The commercial versions of spyware…

5 years ago

New Highly Advanced APT Malware Framework TajMahal that Goes Undetected for 5 years

Security researchers at Kaspersky uncovered a new highly sophisticated APT malware Framework dubbed TajMahal which includes a number of malicious…

6 years ago

Hackers Tampered the Popular Android App With 50 Million Downloads to Deliver Malware

Threat actors tainted the popular Android app within Google play with more than 50 million installs to deliver the Triout…

6 years ago

Hackers Abusing TeamViewer Tool to Deliver Powerful Malware that Steal Sensitive Data

Threat actors misuse the popularity of the TeamViewer Tool and utilizing it to drop the malware on victim devices that…

6 years ago

A Scary Evolution & Alliance of TrickBot, Emotet and Ryuk Ransomware Attack

Ryuk first appeared in August 2018, and while not incredibly active across the globe, at least three organizations were hit…

6 years ago

Spyware From Google Play as a Legitimate Android Apps That Infected 196 Country Users

Dangerous spyware apps discovered form the Google play store that posed as legitimate apps and almost 100,000 users downloaded and…

6 years ago

TA505 Cyber Threat Actors Installing Remote Monitoring Tool via Weaponized MS Word Document

Cyber Criminals from TA505 group started a new campaign that targeting retail, grocery, and restaurant chains by distributing weaponized MS…

6 years ago

Most Important Steps to Prevent Your Organization From Identity Theft – Detailed Explanation

Identity theft by Identity Thief is the ponder utilization of another person's character, it is a genuine wrongdoing(a serious crime). Identity Thief utilizes…

6 years ago