Hackers Compromise Comm100 Live Chat to Attack a Supply Chain
The official installer of the Comm100 Live Chat SaaS application, which is…
Developer of CodeRAT Trojan Releases Source Code
The source code for the CodeRAT remote access trojan has been published…
TrickBot Hack Group Systematically Attacks Ukraine
IBM Security X-Force experts noticed that from the very beginning of the…
ZuoRAT Trojan Hacks Asus, Cisco, DrayTek and NETGEAR Routers
Lumen Black Lotus Labs has discovered a new Remote Access Trojan (RAT)…
Facts to Remember About Trojan Malware
In this article, we will consider one of the vilest, most unpleasant,…
Europol and Intelligence Agencies of 11 Countries Destroyed the FluBot Trojan Infrastructure
Europol announced that law enforcement officers, as a result of an international…
Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware
An unknown hacker attacked German users who are interested in information about…
20 Dangerous Types of Cybersecurity Threats
The cybersecurity threats in this year are more considerable than ever. Due…
Microsoft patches Windows AppX Installer vulnerability that spreads Emotet malware
The latest of this year, December's patch Tuesday brought fixes for six…
Coin Miner – What is it?
Throughout the timeline of the trojan virus evolution, it obtained a lot…
Qbot Trojan Entered The Top Of The Most Widespread Malware
Check Point has released its monthly Global Threat Index for August 2020.…
BlackRock Trojan steals passwords and card data from 337 applications on Android OS
Researchers from ThreatFabric have published a report on the study of a…