Medusa Android Banking Trojan distributed via Flubot’s Attacks Network
According to new research ThreatFabric, two new Android banking Trojans named FluBot and Medusa are relying on the same delivery vehicle as part of simultaneous attack campaign.
Windows security management is a critical routine for enterprises.
According to new research ThreatFabric, two new Android banking Trojans named FluBot and Medusa are relying on the same delivery vehicle as part of simultaneous attack campaign.
A new type of ransomware is found targeting individual user devices and not corporate networks, which is also demanding for low ransom.
A hacker group called Moses Staff is incorporating an undocumented Remote Access Trojan (RAT) that disguises as a Windows Calculator App to go stealth.
Multiple security vulnerabilities have been disclosed in 42 Gears SureMDM solution. It is a mobile device management solution that can be manipulated by threat actors to execute supply chain attacks.
A new fingerprinting technique is exploiting a device’s graphics processing unit (GPU) that can track users activity on the web persistently. This technique is called as DrawnApart, and identifies as a device from the unique properties of the the GPU.
A German Court from Munich has ordered a website owner to pay a penalty of €100 for migrating personal data of users. The owner has leveraged the IP address of the users via Google Fonts library without the user’s consent.
A framework that is used for developing, implementing, monitoring, and improving IT governance is called as COBIT (Control Objectives for Information and Related Technology)
Security researchers at Cyble have identified more than 20,000 instances of data centers that are exposed publicly and could cause catastrophic results if breached by hackers.
The United States under Biden’s command will initiate a new agenda to protect the country’s water sector against cyberattacks, which comes besides their security hardening protocols undertaken recently.
REvil ransomware is a malware that encrypts victims data and asks for a ransom just like any other ransomware. The threat usually asks the ransom in bitcoin that needs to be paid in a limited time if not the ransom amount will continue to rise.
Our vision is to deliver the trending and happening cyber events to the enthusiasts.
We believe in delivering educational and quality content for hassle-free understanding of the subject.
You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.