Tag: Malware

SVG Virus: New Phishing Tactique in Images

Security researchers have discovered a phishing campaign that is based on the…

Stephanie Adlam

Trojan Script Wacatac.B!ml Analysis & Removal on Windows 10/11

Trojan Wacatac is a broad detection name for many malicious programs that…

Stephanie Adlam

Lockbit 4.0 Released, With New Infrastructure and Features

Lockbit ransomware group steps up with a new version of its malicious…

Stephanie Adlam

Trojan:Win32/Patched

Trojan:Win32/Patched refers to a detection for modified versions of legitimate programs. Often…

Stephanie Adlam

Aiocpa PyPI Package Targets Crypto Wallets

A malicious package named aiocpa was identified on the Python Package Index…

Stephanie Adlam

FakeBat Loader is Back With New Tactics and Payload

After a brief decline in loader-based malvertising, the FakeBat loader has re-emerged…

Stephanie Adlam

UC Browser – Is it Legit? Analysis & Verdict

While browsing the Web, you can at some point find yourself with…

Stephanie Adlam

Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers

On October 28, 2024 Dutch cyber police launched a website reporting a…

Stephanie Adlam

P. Diddy Malware Scam Campaign Rides on Media Hype

A worldwide-known scandal around Sean Combs, known as P.Diddy, gave boost to…

Stephanie Adlam

Vilsa Trojan Stealer – What It Is

Researchers discovered a new infostealer malware dubbed Vilsa Stealer, with source code…

Stephanie Adlam

Trojan:Win32/LsassDump.A

Trojan:Win32/LsassDump.A malware aims at gathering system credentials from the LSASS process memory…

Stephanie Adlam

Fake CAPTCHA Sites Trick Users to Run Malicious Code, Install Lumma Stealer

New malware spreading campaign now picks up steam on the Internet, luring…

Stephanie Adlam

AI Assistant

Hello! 👋 How can I help you today?