Super Mario Malware: Hackers Spread Stealers in the Fake Game
The Super Mario video game franchise has gained immense acclaim due to…
Android Malware With Almost 500M Downloads Resides in Google Play
Millions of Android users may be at risk of a cyberattack because…
Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks
An investigation into a supply chain attack that hit 3CX last month…
Mobile Malware Threat Landscape — 2022 Summary
Today, a smartphone is much more than just a way to reach…
Reverse Shell vs. Backdoor : What is the Differences?
Backdoor and Reverse Shell are very similar, which may lead you to…
Hackers Compromise Comm100 Live Chat to Attack a Supply Chain
The official installer of the Comm100 Live Chat SaaS application, which is…
Developer of CodeRAT Trojan Releases Source Code
The source code for the CodeRAT remote access trojan has been published…
TrickBot Hack Group Systematically Attacks Ukraine
IBM Security X-Force experts noticed that from the very beginning of the…
ZuoRAT Trojan Hacks Asus, Cisco, DrayTek and NETGEAR Routers
Lumen Black Lotus Labs has discovered a new Remote Access Trojan (RAT)…
Facts to Remember About Trojan Malware
In this article, we will consider one of the vilest, most unpleasant,…
Europol and Intelligence Agencies of 11 Countries Destroyed the FluBot Trojan Infrastructure
Europol announced that law enforcement officers, as a result of an international…
Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware
An unknown hacker attacked German users who are interested in information about…