Cerberus Malware Improved To Pilfer Google Authenticator 2FA Codes

The Android banking trojan that entered the realm of cyber threats is now back stronger than ever. Researchers have revealed

Read more

Hackers Exploited Trend Micro Antivirus Zero-day In Mitsubishi Electric Hack

The Japanese electronics giant Mitsubishi Electric disclosed a hack last week. It now turns out that the attackers exploited a

Read more

Android Banking Trojan Faketoken Now Also Messages Premium Rate Phone Numbers

Amidst all the new malware that emerge every day, some old viruses also reappear after being revamped. One such example

Read more

Ginp – The Latest Android Banking Trojan Found Active In The Wild

Once again, a new banking Trojan variant has surfaced online that draws attention owing to its typical features. Termed ‘Ginp’,

Read more

Code Execution Vulnerability Found In Symantec Endpoint Protection

Continuing the trail of vulnerable antivirus tools, now joins Symantec. Researchers have found a serious vulnerability in Symantec Endpoint Protection

Read more

Serious Security Vulnerability Found In All McAfee Antivirus Editions

Following Avast, we now hear of a security bug in McAfee antivirus. Researchers have found this vulnerability to affect all

Read more

Remote Code Execution Vulnerability Found In Trend Micro Anti-Threat Toolkit (ATTK)

The Anti-Threat Toolkit (ATTK) by Trend Micro is a dedicated tool for fending off malware infections. However, like any other

Read more

Microsoft Launches ‘Tamper Protection’ For Windows Defender

One of the major attack strategies of most malware is their ability to tamper or turn off antivirus. Microsoft has

Read more

Zero-Day Vulnerability in iTunes Being Exploited in the Wild via BitPaymer Ransomware

Researchers have discovered a zero-day vulnerability in iTunes that is under active exploit. They found the hackers behind the BitPaymer

Read more

Serious Security Vulnerability Found In Bitdefender Antivirus Free 2020

Antivirus software supposedly provide robust security to users against cyber attacks. However, like all other tools, these tools can also

Read more
Do NOT follow this link or you will be banned from the site!