malware

How To Remove Potentially Unwanted Programs

In this post, we will guide you through the process of removing potentially unwanted programs. In today's digital landscape, our systems are constantly bombarded with software installations, both intentional and unintentional. While some programs offer valuable...

Strandhogg Malware: A Threat to Android Users

Here, I will talk about Strandhogg malware on Android devices. Strandhogg is a critical vulnerability discovered in the Android operating system that allows malicious applications to hijack legitimate apps. This means that a malicious app can...

Android SLocker Coronavirus Malware: Scammers Exploit Pandemic Fears

Read on to learn about Android SLocker Coronavirus malware. In 2020, an Android malware variant disguised as a Coronavirus information app exploited anxieties surrounding the pandemic to lock users out of their phones and demand...

Valak Malware turns enterprise data stealer

Once a simple malware loader, Valak has undergone a chilling transformation, evolving into a sophisticated data stealer that targets sensitive information from Microsoft Exchange servers. The news, initially reported by Cybereason's Nocturnus team and confirmed...

Risks Of Cryptojacking In Mobile Devices

Here, we will address cryptojacking in mobile devices to spread more awareness. We'll dive into cryptojacking, including how to detect it and prevent it. Cryptocurrency dates back to the 1980s, but its popularity soared from...

Turla hackers group hijack ESET Antivirus logs to test their malware

Security researchers have uncovered a sophisticated campaign by the Turla hacker group, known for its ties to the Russian government, where they hijacked logs from ESET antivirus software to test their malware. This revelation raises...

Exposed Italian Company Fronting for Guloader Malware Operations

Italian security software company CloudEye has been exposed as a front for the Guloader malware operation, raising serious concerns about the company's legitimacy and potential damage to user trust in the industry. Check Point researchers...

Astaroth malware uses YouTube channel descriptions for hacks

In 2020, the digital landscape witnessed a cunning maneuver by the infamous Astaroth malware. This infostealing Trojan, notorious for targeting Brazilian users, adopted a novel tactic to evade detection and compromise unsuspecting victims: hiding...

Recent posts