Researchers have found a malicious campaign exploiting seemingly legit YouTube accounts. The campaign involves uploading…
Malware Attack
-
- Latest Cyber Security News | Network Security HackingNews
iRecorder Android App Targeted Its Users With AhRAT Malware
Heads up, Android users! If you ever installed the iRecorder app on your phone, it’s…
- Latest Cyber Security News | Network Security HackingNewsVulnerabilities
Samsung ASLR Bypass Flaw Is Actively Exploited – Warns CISA
US CISA recently issued an alert, warning Samsung users about an ASLR bypass flaw being…
- Latest Cyber Security News | Network Security HackingNews
Guerilla Malware Shipped With Roughly 9 Million Android Devices
Researchers have revealed the shipping of millions of Android devices pre-infected with Guerilla malware. The…
- Latest Cyber Security News | Network Security HackingNews
FluHorse Malware Targets Android Users By Mimicking Legit Apps
Researchers have warned Android users of a new malware that steals two-factor authentication (2FA) codes…
- Latest Cyber Security News | Network Security HackingNews
HiddenAds Adware Target Android Via Minecraft App Clones
Heads up, Android users! The notorious HiddenAds adware again targets Android users by impersonating legit…
- Latest Cyber Security News | Network Security HackingNewsVulnerabilities
AuKill Malware Actively Used To Disable EDR In Ongoing Attacks
Researchers have discovered a new malware that remained under the radar for quite some time.…
- Latest Cyber Security News | Network Security HackingNews
Decoy Dog Malware Tool Kit Spotted Via Malicious DNS Queries
A new malware tool kit, “Decoy Dog,” has been actively targeting enterprise networks for a…
- Latest Cyber Security News | Network Security HackingNews
Evil Extractor Infostealer Targets Windows In Recent Phishing Campaign
Researchers observed malicious use of a self-claimed educational tool, “Evil Extractor,” for stealing data. They…
- Cyber AttackLatest Cyber Security News | Network Security HackingNews
3CX Cyber Attack: It Was The Aftermath Of Another Supply-Chain Attack
Days after the horrifying cyberattack, more details about the 3CX incident surface online as Mandiant…