SharkBot Malware Infiltrates Google Play Store Again
Information security specialists from Fox IT discovered two applications in the Google Play Store that distribute the SharkBot Trojan: Mister Phone Cleaner and Kylhavy Mobile Security were installed more than…
Dangers Of Spam Email: Tips How To Avoid, Spam Email Revenge
Many businesses don't consider all of the dangers of spam and just think it is an annoyance. Although unwanted emails are frustrating, they can be threatening in many scenarios. Spam…
Developer of CodeRAT Trojan Releases Source Code
The source code for the CodeRAT remote access trojan has been published on GitHub. This happened after the security researchers identified the malware developer and called him to account because…
Cisco Hack Is Linked to Russian-Speaking Hackers from Evil Corp
Experts from eSentire established that the infrastructure used to hack Cisco in May 2022 was exploited to compromise an unnamed HR solutions company a month earlier. Researchers believe that malicious…
The Japanese Government Decided to Fight the Use of … Floppy Disks
As it turns out, more than 1,900 administrative procedures in Japan still require the use of floppy disks. Now, the newly appointed head of Japan's Ministry of Digital Reform, Taro…
All About Hacker Motivation: Why Do Hackers Hack?
Usually, hackers hack for monetary gain. However, there are less apparent reasons lurking beneath the surface. But knowledge of technology is not enough to be a successful hacker. You also…
Malware Hides in Images from the James Webb Telescope
Securonix researchers have noticed an interesting malware campaign that distributes a malware called GO#WEBBFUSCATOR written in Go. Hackers use phishing emails, malicious documents, and images from the James Webb telescope…
Hackers Are Now More Likely to Attack Not Large Hospitals, but Specialized Clinics
According to a new report from Critical Insight, hackers are increasingly targeting small healthcare companies and specialized clinics that lack the resources to defend themselves. While large healthcare systems, even…
Hidden Scams: Could QR Code Actually Be a Phishing Attack?
Although QR codes have been around for more than 25 years, their use in everyday life has increased dramatically since the pandemic began. But is it always safe to scan…
The LockBit Group Is Taking on DDoS Attacks
Last week, after the information security company Entrust was hacked, the LockBit hacker group was subjected to powerful DDoS attacks. Now the hackers say they have improved DDoS protection and…
Black Hat SEO: Is Someone Phishing With Your Site Domain?
Search engine optimization (SEO) is a process of optimization and upgrading of websites to improve the ranking of search engine results pages and to attract traffic. Among other things, SEO…
Genshin Impact Game’s Anti-Cheat Driver Is Used to Disable Antiviruses
Trend Micro experts have discovered that hackers are abusing the system anti-cheat driver of the popular game Genshin Impact to disable anti-virus software during ransomware attacks. Mhypro2.sys gives access to…