Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

TrickBot Teams up with Shatak Phishers for Conti Ransomware Attacks
TrickBot Teams up with Shatak Phishers for Conti Ransomware Attacks
TrickBot Teams up with Shatak Phishers for Conti Ransomware Attacks
TrickBot Teams up with Shatak Phishers for Conti Ransomware Attacks

TrickBot Teams up with Shatak Phishers for Conti Ransomware Attacks

TrickBot Teams up with Shatak Phishers for Conti Ransomware Attacks A threat actor tracked as Shatak (TA551) recently partnered with the ITG23 gang (aka TrickBot and Wizard Spider) to deploy Conti ransomware on targeted systems. The Shatak operation partners with other malware developers to create phishing campaigns that download and infect victims with malware. Researchers from

PhoneSpy: Android Spyware Campaign Targeting South Korean Users

PhoneSpy: Android Spyware Campaign Targeting South Korean Users An ongoing spyware campaign dubbed ‘PhoneSpy’ targets South Korean users via a range of lifestyle apps that nest in the device and silently exfiltrate data. The campaign deploys a powerful Android malware capable of stealing sensitive information from the users and taking over the device’s microphone and

New Android Malware Targets Netflix, Instagram, and Twitter Users

New Android Malware Targets Netflix, Instagram, and Twitter Users A new Android malware known as MasterFred uses fake login overlays to steal the credit card information of Netflix, Instagram, and Twitter users. This new Android banking trojan also targets bank customers with custom fake login overlays in multiple languages. A MasterFred sample was first submitted to

These Invisible Characters Could Be Hidden Backdoors in Your JS Code

These Invisible Characters Could Be Hidden Backdoors in Your JS Code Could malicious backdoors be hiding in your code, that otherwise appears perfectly clean to the human eye and text editors alike? A security researcher has shed light on how invisible characters can be snuck into JavaScript code to introduce security risks, like backdoors, into your software. Also

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us