Threat actors have a tendency to hide their malignant programs on computers over multiple stages. Previously classified as a malware loader, the Valak Malware has become a multi-stage modular malware and has evolved sophisticatedly since its adv... Read more
In a recent discovery, a major vulnerability affecting every version of Android has been unearthed. This Vulnerability allows the emulation of legitimate applications installed on the Android device to steal the user’s information. StrandH... Read more
A new android malware strain has been identified by certain researchers that channels its malignant activities through Android devices’ accessibility services. This Strain is called DEFENSOR ID. Researchers have observed and reported that DEFENS... Read more
Various digital threats are now surfacing from different parts of the world. And with the outbreak of COVID19, the descendant of a notorious banking Trojan, Zeus, called Silent Night is growing in popularity over the dark web. As a result, a lot... Read more
The pandemic has driven businesses around the world to move their operations digitally in order to survive in the current scenario. Hence, this period has been the best for cybercriminals to prey on their victims. After the Maze ransomware, the... Read more