Vultur Malware Poses as Mobile Antivirus
Users should verify the authenticity of antivirus apps before installation. Security solutions like WebPulse can detect and block malicious URLs…
Hackers Exploit GitHub, FileZilla for Malware
Russian-speaking hackers utilize GitHub and FileZilla to spread banking malware. Deceptive GitHub accounts mimic trusted software, embedding dangerous malware. Proactive…
New Android Trojan Threatens Users
New Android Trojan Antidot poses serious security risks. Antidot disguises as a Google Play update to deceive users. Users should…
Antidot Trojan Threatens Android Users
Antidot Trojan mimics Google Play updates to steal data. It uses VNC, keylogging, and encryption to evade detection. Advanced communication…
Cybersecurity News Weekly Recap
Russian APT hackers target critical infrastructure with sophisticated malware. Exploiting software vulnerabilities continues to be a major threat vector. Over…
Hackers Deploy New Loader LATRODECTUS
LATRODECTUS loader bypasses security and evades detection. It shares techniques with ICEDID, indicating evolving threats. Email campaigns distribute the malware…
Researcher Identifies TeslaLogger Vulnerability
A vulnerability was found in TeslaLogger that could allow unauthorized access. Default credentials and insecure settings were the primary cause.…
Threat Intelligence Feeds Assist Security Teams
Threat intelligence feeds provide real-time updates on cyber threats. Commercial feeds offer more reliable data than open-source feeds. Integration into…
YARA-X Enhances Malware Detection
YARA-X introduces enhanced malware detection performance. Improved reliability and security with Rust implementation. YARA-X is stable and ready for user…
Cyber Attackers Target AI Research
SugarGh0st RAT targets AI research in the U.S. Attack employs AI-themed phishing emails. Collaboration aids in identifying threats effectively.