Malicious CPU-Z Copy Is Spread In Google Search Ads
Attackers are again abusing the Google Ads platform to distribute malicious advertising…
SecuriDropper Bypasses Google Play & Android Defenses
SecuriDropper is a rare example of the Android dropper malware that operates…
Socks5Systemz Proxy Service Infects 10,000 Systems Worldwide
A proxy botnet, "Socks5Systemz", uses malware loaders to infiltrate computers across the…
Malicious WhatsApp Mods Spread Through Telegram
Some WhatsApp mods, which are unofficial versions of the app, have been…
IoT Malware Attacks Grow by 400% in 2023
IoT malware has been a major concern over the last decade. However,…
Skype & Microsoft Teams Spam Spreads DarkGate Loader
Over the past few years, DarkGate has been relatively inactive. However, several…
TOP 10 Most Dangerous Computer Viruses In History
Computer viruses really resemble real ones. They can infect thousands of computers…
Aluc Service: What Is Aluc Appliaction & How to Remove?
Aluc Service is a strange service you can spectate in the Task…
QakBot Botnet Dismantled, But Can It Return?
On Tuesday, the US authorities announced that as a result of the…
DarkGate Loader Expands Activity, Delivers Ransomware
A new DarkGate malware deployment campaign has caught the attention of cybersecurity…
Botnet of 400,000 Devices Used as Proxy Nodes Uncovered
Cybercriminals used stealthy malware to create a botnet of 400,000 proxy servers.…
Forged Driver Signatures Exploited In The Wild
Hackers actively use driver signature spoofing, which originates from a loophole in…