A new stealthy backdoor from the authors of TrickBot that is used to compromise and gain full access to corporate networks is being delivered through a new phishing campaign. Gaining access in a quiet manner over a corporate network is a m... Read more
A recent study that dealt with the trends within the threat landscape revealed that fileless threats are the most common critical-severity cybersecurity threat to endpoints in the threat category list. The research report further reveals that en... Read more
The evolution of the threat landscape is proving difficult to handle for those who are ill prepared for this rapid transformation in technology. And now with malicious entities from the digital world offering their hacker-for-hire services to th... Read more
A new strain of Android malware that comes with a wide array of features has recently been analysed and discovered by security researchers. This malware strain is capable of stealing credentials from 226 applications.This new trojan called Alien... Read more
The AgeLocker ransomware, which encrypts the device’s data, and in some cases, steals files from the victim has been targeting the QNAP NAS devices. An encryption algorithm called Age (Actually Good Encryption) is being utilized by the ran... Read more