This guest post is written by Vishal Thakur, CSIRT/Salesforce. For more on Vishal, read his bio at the end of the…

Recently, we discovered a gold…er…APK mine of fake hacking apps. The “legitimate” versions of hack apps are intended to hack other apps in…

Kaspersky has found what they deem as a jack of all trades malicious app they call Trojan.AndroidOS.Loapi. Like the Trojan AsiaHitGroup we discovered…

Update (2017-12-05): We noted some malvertising chains using a new domain name (newadultthem[.]info) also hosted on the same IP address as…

Last week, we warned you about a new method by which the Mac malware OSX.Proton is being spread, we informed you…

We usually advise people that have fallen victim to banker Trojans to change all their passwords, especially the ones that are…

We recently came across a campaign targeting a Saudi Arabia Government entity via a malicious Word document which at first reminded…

In the previous part of the Kronos analysis, we took a look at the installation process of Kronos and explained the…

People have become increasingly reliant on their mobile devices in recent years. Smartphones and tablets have revolutionized daily life. Unfortunately, such…

Last year, we reported on a new modular malware called TrickBot that uses a network protocol similar to Dyreza. The malware was…