FluBot Malware Strikes Again

FluBot Malware Strikes Again

FluBot is back affecting a greater geographical area

FatalRAT: New Trojan Leveraging Telegram

FatalRAT: New Trojan Leveraging Telegram

Cybercriminals discovered a new creative approach to spread malicious software while remaining anonymous

Password-Stealing Windows Malware has been Discovered

Password-Stealing Windows Malware has been Discovered

The malware, named MosaicLoader, is capable of installing Bitcoin miners and also delivering Trojan malware

WildPressure APT Cybercriminal Gang Targeting macOS

WildPressure APT Cybercriminal Gang Targeting macOS

Milum Trojan has been updated and can penetrate macOS

Customized Trojan Stole Data From 3M Windows PC Users

Customized Trojan Stole Data From 3M Windows PC Users

Personal data scrapped of over 3M PCs between 2018 and 2020

New ChaChi Trojan Targeting U.S. Schools

New ChaChi Trojan Targeting U.S. Schools

A new GoLang Trojan has been added to the Malware Family

8 New Android Apps Found Infected with Joker Malware

8 New Android Apps Found Infected with Joker Malware

Google took down the applications containing Joker

TeaBot Trojan Steals Bank Details via Fake Antivirus Apps

TeaBot Trojan Steals Bank Details via Fake Antivirus Apps

Android malware spread quickly across smartphones

Foodservice Supplier Edward Don Hit by a Ransomware Cyberattack

Foodservice Supplier Edward Don Hit by a Ransomware Cyberattack

Qbot trojan was found on the Edward Don network

ESET Unearths Android Trojan That Steals Funds from 2FA-Secured PayPal Accounts

ESET Unearths Android Trojan That Steals Funds from 2FA-Secured PayPal Accounts

The Android malware can steal funds in under 5 seconds

Banks Compromised Using GPRS/3G/LTE Capable Devices Implanted on Local Networks

Banks Compromised Using GPRS/3G/LTE Capable Devices Implanted on Local Networks

Attackers stole tens of millions via mobile connections

Banking Trojan DanaBot Now Uses Signed Email Spam as Propagation Method

Banking Trojan DanaBot Now Uses Signed Email Spam as Propagation Method

The malware now spams the emails collected from victims

Fileless Backdoored Trojan Spreads Using Worm Living in Removable Drives

Fileless Backdoored Trojan Spreads Using Worm Living in Removable Drives

The Trojan comes with key logging and DDoSing capabilities

Emotet Banking Trojan Uses Stolen Templates to Boost Phishing Campaign Numbers

Emotet Banking Trojan Uses Stolen Templates to Boost Phishing Campaign Numbers

The IcedID banking trojan is the second stage payload

Fancy Bear APT Uses New Cannon Trojan to Target Government Entities

Fancy Bear APT Uses New Cannon Trojan to Target Government Entities

The spear phishing attack campaign uses email as C2 channel

Mylobot Botnet Now Exfiltrates Data Using Second Stage Khalesi Trojan

Mylobot Botnet Now Exfiltrates Data Using Second Stage Khalesi Trojan

The botnet is also capable of DDoS and ransomware attacks

Trojanized Android App Found on Google Play with More Than 5,000 Installs

Trojanized Android App Found on Google Play with More Than 5,000 Installs

The call recording app was available since November 30, 2017

 
Want more? Browse: