Trojan HotRat Is Distributed through Pirated Versions of Software and Games
Avast experts have warned that a new variant of AsyncRAT malware, called…
Gozi and IcedID Trojans Spread via Malvertising
Malvertising on Google Search is an unpleasant occurrence where malicious ads appear…
Wise Remote Trojan: Infostealer, RAT, DDoS Bot, and Ransomware
Wise Remote Stealer is a potent and malicious software that operates as…
Super Mario Malware: Hackers Spread Stealers in the Fake Game
The Super Mario video game franchise has gained immense acclaim due to…
Android Malware With Almost 500M Downloads Resides in Google Play
Millions of Android users may be at risk of a cyberattack because…
Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks
An investigation into a supply chain attack that hit 3CX last month…
Mobile Malware Threat Landscape — 2022 Summary
Today, a smartphone is much more than just a way to reach…
Reverse Shell vs. Backdoor : What is the Differences?
Backdoor and Reverse Shell are very similar, which may lead you to…
Hackers Compromise Comm100 Live Chat to Attack a Supply Chain
The official installer of the Comm100 Live Chat SaaS application, which is…
Developer of CodeRAT Trojan Releases Source Code
The source code for the CodeRAT remote access trojan has been published…
TrickBot Hack Group Systematically Attacks Ukraine
IBM Security X-Force experts noticed that from the very beginning of the…
ZuoRAT Trojan Hacks Asus, Cisco, DrayTek and NETGEAR Routers
Lumen Black Lotus Labs has discovered a new Remote Access Trojan (RAT)…