In the ever-evolving landscape of cybersecurity threats, a new player has entered the scene, …
malicious software
-
-
AI in CybersecurityAI in Software Development
Malicious Python Packages on PyPI Downloaded 39,000+ Times, Steal Sensitive Data
by David Chenby David Chen 2 minutes readIn a recent alarming discovery, cybersecurity researchers have unearthed malicious Python packages lurking within …
-
AI in CybersecurityIT ServicesRansomware-as-a-Service (RaaS)
Medusa Rides Momentum From Ransomware-as-a-Service Pivot
by Samantha Rowland 1 minutes readIn the realm of cybersecurity, adaptability is key, and the Medusa group has exemplified …
-
AI in CybersecurityMobile Devices
This sneaky Android spyware needs a password to uninstall. Here’s how to remove it without one
by Jamal Richaqrds 2 minutes readTitle: Uninstalling Sneaky Android Spyware Without a Password: A Simple Trick In the vast …
-
AI in CybersecurityChildren's Electronics
Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices
by David Chenby David Chen 2 minutes readThe recent discovery of Triada malware preloaded on counterfeit Android phones has sent shockwaves …
-
Activism in RetailAI in CybersecurityChildren's Electronics
Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices
by Samantha Rowland 2 minutes readIn recent news, a concerning trend has emerged in the world of smartphones, shedding …
-
AI in CybersecurityMobile Security
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials
by Samantha Rowland 2 minutes readIn a concerning development for Android users, cybersecurity researchers have unearthed a sophisticated banking …
-
AI in CybersecurityMalware Protection
CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection
by Lila Hernandez 2 minutes readIn the ever-evolving landscape of cybersecurity threats, a new malicious software has emerged, causing …
-
AI in CybersecurityMobile Security
PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps
by David Chenby David Chen 2 minutes readIn a recent development in the cybersecurity landscape, a sophisticated Android malware strain, known …
-
AI in CybersecurityIT security
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware
by David Chenby David Chen 2 minutes readIn a recent cybersecurity development, the threat actor EncryptHub has made headlines by leveraging …
- 1
- 2