The newest version of the AnarchyGrabber is even more sophisticated and capable of doing a lot more damage than its predecessors. This new variant is capable of stealing passwords and user tokens, disable 2FA, and even spreading malware to the n... Read more
The notorious Ke3chang hacking group which has haunted the military and government of various countries in this technologically advanced generation has now updated the malignant tools in their arsenal by combining the source code and features fr... Read more
Threat actors have a tendency to hide their malignant programs on computers over multiple stages. Previously classified as a malware loader, the Valak Malware has become a multi-stage modular malware and has evolved sophisticatedly since its adv... Read more
In a recent discovery, a major vulnerability affecting every version of Android has been unearthed. This Vulnerability allows the emulation of legitimate applications installed on the Android device to steal the user’s information. StrandH... Read more
A new android malware strain has been identified by certain researchers that channels its malignant activities through Android devices’ accessibility services. This Strain is called DEFENSOR ID. Researchers have observed and reported that DEFENS... Read more