malware
Tutorials
How To Remove Potentially Unwanted Programs
In this post, we will guide you through the process of removing potentially unwanted programs.
In today's digital landscape, our systems are constantly bombarded with software installations, both intentional and unintentional.
While some programs offer valuable...
News
Strandhogg Malware: A Threat to Android Users
Here, I will talk about Strandhogg malware on Android devices.
Strandhogg is a critical vulnerability discovered in the Android operating system that allows malicious applications to hijack legitimate apps.
This means that a malicious app can...
News
Android SLocker Coronavirus Malware: Scammers Exploit Pandemic Fears
Read on to learn about Android SLocker Coronavirus malware.
In 2020, an Android malware variant disguised as a Coronavirus information app exploited anxieties surrounding the pandemic to lock users out of their phones and demand...
News
Valak Malware turns enterprise data stealer
Once a simple malware loader, Valak has undergone a chilling transformation, evolving into a sophisticated data stealer that targets sensitive information from Microsoft Exchange servers.
The news, initially reported by Cybereason's Nocturnus team and confirmed...
Features
Risks Of Cryptojacking In Mobile Devices
Here, we will address cryptojacking in mobile devices to spread more awareness. We'll dive into cryptojacking, including how to detect it and prevent it. Cryptocurrency dates back to the 1980s, but its popularity soared from...
News
Turla hackers group hijack ESET Antivirus logs to test their malware
Security researchers have uncovered a sophisticated campaign by the Turla hacker group, known for its ties to the Russian government, where they hijacked logs from ESET antivirus software to test their malware.
This revelation raises...
News
Exposed Italian Company Fronting for Guloader Malware Operations
Italian security software company CloudEye has been exposed as a front for the Guloader malware operation, raising serious concerns about the company's legitimacy and potential damage to user trust in the industry.
Check Point researchers...
News
Astaroth malware uses YouTube channel descriptions for hacks
In 2020, the digital landscape witnessed a cunning maneuver by the infamous Astaroth malware. This infostealing Trojan, notorious for targeting Brazilian users, adopted a novel tactic to evade detection and compromise unsuspecting victims: hiding...