Shedun Trojanized adware family implements the ability to automatically install any app on the devices by exploiting the Android Accessibility…
The hacking group that behind the Dark Seoul Operation that hit entities in South Korea in 2013 may be back…
The developers of the Dyre banking Trojan have released a new version of the malware that includes support for Windows…
The experts at Malwarebytes have noticed that threat actors in the wild are reusing the Blackhole Exploit Kit despite its…
Twittor is a tool open source that was designed by the London-based researchers Paul Amar to control botnets via Direct Messages. Twittor is…
Experts at BitDefender have discovered a Cryptolocker/Cryptowall Ransomware Kit offered for sale at $3,000, source code included. Yesterday I wrote…
FAKBEN is offering a professional Ransomware-as-a-service that relies on a new CryptoLocker ransomware which can be downloaded through the executable file.…
Researchers at Trustwave have published the analysis of the Cherry Picker threat, a point-of-sale (PoS) malware that went undetected over…
Experts at Cheetah Mobile are warning about Android Tablet pre-loaded with Cloudsota Trojan sold on Amazon and other online stores.…
Experts at Bitdefender have discovered a flaw in Linux Encryption Ransomware Linux.Encoder1 that exposes the decryption Key used to lock…
This website uses cookies.