In a recent discovery, a major vulnerability affecting every version of Android has been unearthed. This Vulnerability allows the emulation of legitimate applications installed on the Androi... Read more
A new android malware strain has been identified by certain researchers that channels its malignant activities through Android devices’ accessibility services. This Strain is called DEFENSOR... Read more
Various digital threats are now surfacing from different parts of the world. And with the outbreak of COVID19, the descendant of a notorious banking Trojan, Zeus, called Silent Night is grow... Read more
The pandemic has driven businesses around the world to move their operations digitally in order to survive in the current scenario. Hence, this period has been the best for cybercriminals to... Read more
Along with the real world, the digital world is also suffering from a pandemic of its own, and it’s being used to collect personal information from the user’s devices. This pande... Read more
According to the various standards and methodologies that are used during a penetration test, the results vary for any organization who wants to secure their IT infrastructure and fix the ex... Read more