Latest Articles in malware

Cryptomining Replaces Ransomware as Most Popular Cybercrime Malware

Analysis of vulnerability and threat trends shows cryptomining malware dominates threat landscape in the first half of 2018

Read More

Fortnite V-bucks Scams affect Tens of Thousands of Users by Installing Malware on their System

Since Rainway system allows only whitelisted domains, users can connect only to approved URLs

Read More

15-year-old-flaw used by Hackers and Surveillance Agencies to deploy Malware to Mac OS Devices?

Code-signing is a process that checks whether the files are signed with digital certificate

Read More

Evolution of Malware to Exploit Cryptocurrencies

Cybercriminals are evolving their attack methods to increase their success rates and to accelerate infections

Read More

Humans Are The Weakest Link When It Comes To Security

There is a famous saying in the security world- There is security patch for vulnerability but there is no patch for human stupidity

Read More

Find Out How Cybercriminals Use Stolen Data for Ransomware Attacks

It is always important to understand how exactly the hackers use the stolen data to get prepared for next time

Read More

Organisations Must Not Ignore Threat of Cryptocurrency Mining Malware

More malicious activity could exist in coin mining, such as backdoors and unpatched vulnerabilities

Read More

Malware Displaying Porn Ads Discovered in Game Apps on Google Play

The malicious code can move laterally within the infrastructure of the phone, opening the door for other attacks such as user credential theft

Read More

Telegram Mirrored to Create Fake Apps that Serve Malware

The fake app, Teligram, features similar branding and app store listings to trick users to install malware on their device and hijack their data

Read More

Critical Infrastructure Systems Hit by new Malware Named Triton

Incidents like these emphasize the need for industrial operators to invest in securing their infrastructure

Read More