A recent study that dealt with the trends within the threat landscape revealed that fileless threats are the most common critical-severity cybersecurity threat to endpoints in the threat category list. The research report further reveals that en... Read more
The evolution of the threat landscape is proving difficult to handle for those who are ill prepared for this rapid transformation in technology. And now with malicious entities from the digital world offering their hacker-for-hire services to th... Read more
A new strain of Android malware that comes with a wide array of features has recently been analysed and discovered by security researchers. This malware strain is capable of stealing credentials from 226 applications.This new trojan called Alien... Read more
The AgeLocker ransomware, which encrypts the device’s data, and in some cases, steals files from the victim has been targeting the QNAP NAS devices. An encryption algorithm called Age (Actually Good Encryption) is being utilized by the ran... Read more
As various reports from around the world suggest, ransomware is attacks are on the rise. As compared to other forms of malware and due to relatively low execution costs, high rates of return, ransomware has quickly become a preferred method of a... Read more