Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

TrickBot Teams up with Shatak Phishers for Conti Ransomware Attacks
TrickBot Teams up with Shatak Phishers for Conti Ransomware Attacks
TrickBot Teams up with Shatak Phishers for Conti Ransomware Attacks
TrickBot Teams up with Shatak Phishers for Conti Ransomware Attacks

TrickBot Teams up with Shatak Phishers for Conti Ransomware Attacks

TrickBot Teams up with Shatak Phishers for Conti Ransomware Attacks A threat actor tracked as Shatak (TA551) recently partnered with the ITG23 gang (aka TrickBot and Wizard Spider) to deploy Conti ransomware on targeted systems. The Shatak operation partners with other malware developers to create phishing campaigns that download and infect victims with malware. Researchers from

PhoneSpy: Android Spyware Campaign Targeting South Korean Users

PhoneSpy: Android Spyware Campaign Targeting South Korean Users An ongoing spyware campaign dubbed ‘PhoneSpy’ targets South Korean users via a range of lifestyle apps that nest in the device and silently exfiltrate data. The campaign deploys a powerful Android malware capable of stealing sensitive information from the users and taking over the device’s microphone and

New Android Malware Targets Netflix, Instagram, and Twitter Users

New Android Malware Targets Netflix, Instagram, and Twitter Users A new Android malware known as MasterFred uses fake login overlays to steal the credit card information of Netflix, Instagram, and Twitter users. This new Android banking trojan also targets bank customers with custom fake login overlays in multiple languages. A MasterFred sample was first submitted to

These Invisible Characters Could Be Hidden Backdoors in Your JS Code

These Invisible Characters Could Be Hidden Backdoors in Your JS Code Could malicious backdoors be hiding in your code, that otherwise appears perfectly clean to the human eye and text editors alike? A security researcher has shed light on how invisible characters can be snuck into JavaScript code to introduce security risks, like backdoors, into your software. Also

× Chat with us