Skip to content

F1TYM1

InfoSec News

  • Fity Feeds
  • Fity Blog
  • About
  • Other

Malware / Ransomware

Hackers Tampered With APKPure Store to Distribute Malware Apps
Fraudsters Flooding Collaboration Tools With Malware
APKPure app contained malicious adware, say researchers
Three ways ISE 3.0 enables visibility-driven network segmentation to gain zero trust
APKPure is not safe, distributes Trojans | Kaspersky official blog
Alert — There's A New Malware Out There Snatching Users' Passwords
Researchers uncover a new Iranian malware used in recent cyberattacks
How do we stamp out the ransomware business model? Ban insurance payouts for one, says ex-GCHQ director
Collaboration Platforms Increasingly Abused for Malware Distribution, Data Exfiltration
Gigaset Android Update Server Hacked to Install Malware on Users' Devices
Hackers Exploit Unpatched VPNs to Install Ransomware on Industrial Targets
Digging Into the Third Zero-Day Chrome Flaw of 2021
Post-Ransomware Response: Victim Says 'Do the Right Thing'
Another supply-chain attack? Android maker Gigaset injects malware into victims' phones via poisoned update
Lockdown Saw Rise in Wine Domains and Wine Scammers
A new headache for ransomware-hit companies. Extortionists emailing your customers
Hackers Are Exploiting Discord Links to Serve Up Malware
Ransomware: From blockers to cryptors and beyond | Kaspersky official blog
Unofficial Android App Store APKPure Infected With Malware
Google’s Project Zero Finds a Nation-State Zero-Day Operation
Cybercriminals Continue to Exploit Human Nature Through Phishing and Spam Attacks
Watch Out—That 'Call of Duty: Warzone' Cheat Might Be Malware
How ransomware makes victims pay | Kaspersky official blog
Attackers deliver legal threats, IcedID malware via contact forms
Leading cosmetics group Pierre Fabre hit with $25 million ransomware attack
The Week in Ransomware - April 9th 2021 - Massive ransom demands
Android malware found embedded in APKPure store application
Zoom zero-day discovery makes calls safer, hackers $200,000 richer
Cryptomining containers caught coining cryptocurrency covertly
Threat matrix for storage services
Investigating a unique “form” of email delivery for IcedID malware
Malware Hidden in Call of Duty Cheating Software
The Business of Fraud: Fraud Tutorials and Courses
Malware adapted for the Apple M1 | Kaspersky official blog
Malicious code in APKPure app
Backdoor.Win32.Small.n Code Execution
Backdoor.Win32.Hupigon.das Unauthenticated Open Proxy
Trojan.Win32.Hotkeychick.d Insecure Permissions
Trojan-Downloader.Win32.Genome.qiw Insecure Permissions
Trojan-Downloader.Win32.Genome.omht Insecure Permissions

Inside the Third Reich’s Radio



  • Join IEEE
  • |
  • IEEE.org
  • |
  • IEEE Xplore Digital Library
  • |
  • IEEE Standards
  • |
  • IEEE Spectrum
  • |
  • More Sites
  • Create Account
  • |
  • Sign In

Related

Posted on 2021-03-30Author BlogCategories Fity Feeds

Post navigation

Previous Previous post: New Tool Strips Manipulative “Dark Patterns” From Mobile Apps
Next Next post: Daily Crunch: Google starts testing its cookie alternative