Cross-OS Malware ‘ModStealer’ Threatens Crypto Wallets
Enjoyed this article? Share it with your friends! A new malware called…
Hackers Use Ethereum Smart Contracts to Mask Malware in NPM Packages
Enjoyed this article? Share it with your friends! Hackers have discovered a…
VirusTotal finds hidden malware phishing campaign in SVG files
VirusTotal has discovered a phishing campaign hidden in SVG files that create…
Brokewell Android malware delivered through fake TradingView ads
Cybercriminals are abusing Meta’s advertising platforms with fake offers of a free…
Google to verify all Android devs to block malware on Google Play
Google is introducing a new defense for Android called ‘Developer Verification’ to block malware installations…
APT36 hackers abuse Linux .desktop files to install malware in new attacks
The Pakistani APT36 cyberspies are using Linux .desktop files to load malware…
ERMAC Android malware source code leak exposes banking trojan infrastructure
The source code for version 3 of the ERMAC Android banking trojan has been leaked…
200,000 Potential Victims Identified As Malware Disguised As Legitimate Apps Crack Bank Accounts, Warns CIFAS
A prominent fraud prevention service says international crime groups are spreading malware…
Hackers Attack Android Users’ Bank Accounts As Rapidly Improving Malware Steals PIN Codes and Login Credentials, Unlocks Patterns and Records Screens: Cybersecurity Researchers
A rapidly evolving bank malware now has far greater capabilities to infect…
Lumma infostealer malware returns after law enforcement disruption
The Lumma infostealer malware operation is gradually resuming activities following a massive…
NimDoor Malware Slips into Macs via Fake Video Meetings
Enjoyed this article? Share it with your friends! Sentinel Labs has discovered…
SparkKitty Malware Targets Photo Galleries to Hunt Crypto Seed Phrase
Enjoyed this article? Share it with your friends! A new type of…

