How to hack an Android smartphone with Evil Droid
The use of hidden malware in mobile applications outside official platforms such as the Play Store or AppStore is one of the main infection mechanisms used by cybercriminal groups, sinceRead More →
The use of hidden malware in mobile applications outside official platforms such as the Play Store or AppStore is one of the main infection mechanisms used by cybercriminal groups, sinceRead More →
Cybersecurity specialists report that a malware variant for the theft of passwords, credit cards, and cryptocurrency addresses is being distributed on the Internet through an alleged pirated copy of theRead More →
Symantec researchers discovered a new malicious operation using cryptocurrency malware identified as Clipminer. This strain would be based on the KryptoCibule malware, a Trojan with cryptocurrency and e-wallet theft capabilities,Read More →
Specialists from security firm Vedere Labs published research detailing how a ransomware variant could spread across an enterprise network using vulnerable Internet of Things (IoT) devices. For their research, theRead More →
Researchers at security firm Fortinet report detecting a fraudulent campaign based on the delivery of three pieces of fileless malware with enhanced confidential information-stealing capabilities. The malware is delivered throughRead More →
During the last couple of weeks, dozens of notes and reports have been published about the cybercriminal group Killnet, described as a pro-Russia hacking operation and which has become relevantRead More →
Researchers from Google Threat Analysis Group (TAG) report that in 2021, software development firm Cytrox sold Predator spyware to various hacking groups backed by state actors. These attacks are basedRead More →
A couple of months ago, CloudSEK researchers identified a new and unusual strain of ransomware. Dubbed GoodWill, this new variant of encryption malware appears to pursue very different targets thanRead More →
Microsoft published a report detailing its researchers’ findings on payment card stealing malware, mentioning that threat actors increasingly use malicious PHP scripts to manipulate payment systems and bypass online securityRead More →
© 2024 All Rights Reserved
info@iicybersecurity.com