Steganography Attack
Researchers have discovered a non-obvious tactic in which attackers use steganography. While…
MassJacker Malware
Cybersecurity researchers have found MassJacker, a new, previously undocumented malware. It targets…
Roblox Robux Generator Scams
Scammers use Robux Generator as a lure to trick the target audience…
SVG Virus: New Phishing Tactique in Images
Security researchers have discovered a phishing campaign that is based on the…
Lockbit 4.0 Released, With New Infrastructure and Features
Lockbit ransomware group steps up with a new version of its malicious…
Trojan:Win32/Patched
Trojan:Win32/Patched refers to a detection for modified versions of legitimate programs. Often…
Aiocpa PyPI Package Targets Crypto Wallets
A malicious package named aiocpa was identified on the Python Package Index…
FakeBat Loader is Back With New Tactics and Payload
After a brief decline in loader-based malvertising, the FakeBat loader has re-emerged…
UC Browser – Is it Legit? Analysis & Verdict
While browsing the Web, you can at some point find yourself with…
Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers
On October 28, 2024 Dutch cyber police launched a website reporting a…
P. Diddy Malware Scam Campaign Rides on Media Hype
A worldwide-known scandal around Sean Combs, known as P.Diddy, gave boost to…
Vilsa Trojan Stealer – What It Is
Researchers discovered a new infostealer malware dubbed Vilsa Stealer, with source code…