Purple Fox malware is actively distributed via Telegram Installers
Purple Fox malware is distributed via malicious Telegram Desktop Installer, this malware installs further payloads on the affected devices.
Purple Fox malware is distributed via malicious Telegram Desktop Installer, this malware installs further payloads on the affected devices.
If you’re wondering whether your email account is compromised by RedLine malware, you can check the same with ‘Have I Been Pwned’ website as RedLine malware has now 441,000 accounts that are compromised.
The process of gathering sensitive information or deploying malicious programs using deceptive e-mails and websites is called Phishing.
AvosLocker Ransomware group has given a free decryptor after accidentally encrypting a US government agency.
Japanese companies are being targeted by a novel malware called Flagpro developed by BlackTech cyber-espionage APT group.
A new malicious campaign was discovered by security researchers that disguises malicious code as legitimate exe files. The researchers have figured out that there is a payload that is considered a novel threat and being distributed to Windows systems with a low detection rate called Blister.
A phishing campaign is ongoing and deploying a new malware called Dridex. This campaign sends fake employee termination emails so the victims will fall for the bait and open the email with a malicious excel file which when opened mocks the victims with season greetings.
When a machine starts analyzing and executing problems with human like intelligence then it is called as Artificial Intelligence (AI).
Researchers from Prevailion have discovered a new malware called ‘DarkWatchman’ that is highly-capable of JavaScript RAT along with a keylogger
Cybersecurity is a process of managing and securing networks, servers, computers, users, mobile devices, applications, and databases from cyberattacks, data leakage and unauthorized access. It is normally a combination of strategy, process, tools, skills and implementation to achieve improved cyber resilience against unforeseen data breaches and cyber attacks.
Our vision is to deliver the trending and happening cyber events to the enthusiasts.
We believe in delivering educational and quality content for hassle-free understanding of the subject.
You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.