- Android malware, Android malware and more Android malwareby GReAT on March 20, 2024 at 11:00 am
In this report, we share our latest Android malware findings: the Tambir spyware, Dwphon downloader and Gigabud banking Trojan.
- The State of Stalkerware in 2023β2024by Kaspersky on March 13, 2024 at 8:00 am
In this report, Kaspersky shares statistics on stalkerware detections, as well as insights into the impact of digital stalking in 2023 and the beginning of 2024, and advice for those affected.
- The mobile malware threat landscape in 2023by Anton Kivva on February 26, 2024 at 8:00 am
This report details statistics and key trends associated with mobile malware: Google Play Trojans, malicious messaging app mods, and others.
- A lightweight method to detect potential iOS malwareby Maher Yamout on January 16, 2024 at 10:00 am
Analyzing Shutdown.log file as a lightweight method to detect indicators of infection with sophisticated iOS malware such as Pegasus, Reign and Predator.
- IT threat evolution in Q3 2023. Mobile statisticsby Anton Kivva on December 1, 2023 at 10:00 am
Mobile threat statistics for Q3 2023 include data on malware, adware, banking Trojans and ransomware for Android devices.
- IT threat evolution Q3 2023by David Emm on December 1, 2023 at 10:00 am
Attacks on a critical infrastructure target in South Africa, supply-chain attack on Linux machines, Telegram doppelganger used to target people in China.
- Gaming-related cyberthreats in 2023: Minecrafters targeted the mostby Kaspersky on November 6, 2023 at 10:00 am
Gaming-related threat landscape in 2023: desktop and mobile malware disguised as Minecraft, Roblox and other popular games, and the most widespread phishing schemes.
- WhatsApp spy mod spreads through Telegram, attacks Arabic-speaking usersby Dmitry Kalinin on November 2, 2023 at 10:00 am
A WhatsApp mod with a built-in spy module has been spreading through Arabic and Azeri Telegram channels since August 2023.
- The outstanding stealth of Operation Triangulationby Georgy Kucherin, Leonid Bezvershenko, Valentin Pashkov on October 23, 2023 at 11:00 am
In this report Kaspersky shares insights into the validation components used in Operation Triangulation, TriangleDB implant post-compromise activity, as well as details of some additional modules.
- Evil Telegram doppelganger attacks Chinese usersby Igor Golovin on September 8, 2023 at 10:00 am
Spyware Telegram mod in Uighur and Chinese spreads through Google Play stealing messages and other user data.
Mobile Threats
AWS News Blog Announcements, Updates, and Launches.
Access Management Information related to the system that enables a security leader to control access to areas and resources in their enterprise.
With the increasing threat of cyber attacks, it is crucial for countries to have strong defenses to protect their citizens, economy, and national security.
Jennifer Ewbank is the Deputy Director of CIA for Digital Innovation, responsible for accelerating the development and integration of digital and cyber.
As the temperatures begin to drop and winter approaches, the last thing on our minds is dealing with a potential scam.
Tips The Official Blog from Kaspersky covers information to help protect you against viruses, spyware, hackers, spam & other forms of malware.
Red Hat Linux Security is the community's central source for information on Linux and open-source security.
China captured the world's attention with its large-scale military exercises off Taiwan, another offensive was taking place in the cyber digital realm.
Russians were warned to rush to their nearest nuclear bomb shelters and take anti-radiation pills after hackers took over state media.
Credit card fraud has been on the rise for about a decade. In 2016 alone, losses topped $24 billion worldwide, half of which affected cardholders in the US.
Electronic Warfare and Cyber is to acquire integrated intelligence and cyber warfare capabilities to enable freedom of maneuver on the battlefield.
You should learn how to hack as a former hacker, Prof. Vigfusson argues that our main hope to improve cyber security is for all of us to adopt the attackerβs mi...