News

Researchers found a website spoofing Bitdefender antivirus The site delivers a remote access trojan Crooks are using it to ...
The previously undiscovered malware represents a ... the Linux trojan is extremely stealthy. It can't be detected using the common netstat command. To conceal itself, the backdoor sits dormant ...
But while cryptojacking and ransomware continue to be widespread threats, other attackers have continued to quietly deploy a potentially much more damaging threat: trojan malware. As the name ...
Fortinet has identified a new Windows RAT operating stealthily on compromised systems with advanced evasion techniques ...
A Trojan or Trojan horse is a variety of malware that disguises itself as something you want in order to trick you into letting it through your defenses. Like other types of malware, a Trojan is ...
Researchers have found new versions of a sophisticated Android financial-fraud Trojan that’s notable for its ability to intercept calls a victim tries to place to customer-support personnel of ...
In January 2024, Group-IB analysts identified a landing page linked to Boolka’s operations, which distributed the BMANAGER modular Trojan. This discovery led to unmasking Boolka’s malware delivery ...