Category: Malware

Read our latest blog posts

Phishing Attacks 101: Types of Phishing Attacks and How to Prevent...

Hackers target large organizations to trick their employees and steal sensitive data. What are phishing attacks and...

Continue reading

Analysing Third-Party App Stores for Modded APKs Through Signature Verification

Third-party applications may thus seem innocent, but could in fact be nefarious and have grave implications on...

Continue reading

Malware Analysis and Reverse Engineering: Analysing Magecart Skimmer

We explore the process of Malware Analysis and Reverse Engineering (MA&RE) by analysing Magecart’s skimming malware.

Continue reading

How Browser Extensions can Exploit User Activities for Malicious Operations

All browser extensions may not be malicious, but they are dangerous. We explain how extensions exploit permissions...

Continue reading