Category: Malware

Read our latest blog posts

The Shang-Chi Malware Campaign: Is your pirated copy of the summer...

A recent campaign is spreading malware embedded in pirated copies of popular summer blockbusters like Shang-Chi and...

Continue reading

The Unabated Reign of ATM Hacking: The 2021 Rajasthan ATM Attack...

Here are the specifics of the numerous physical and electronic attack vectors used by ATM hackers, highlighting...

Continue reading

Phishing Attacks 101: Types of Phishing Attacks and How to Prevent...

Hackers target large organizations to trick their employees and steal sensitive data. What are phishing attacks and...

Continue reading

Analysing Third-Party App Stores for Modded APKs Through Signature Verification

Third-party applications may thus seem innocent, but could in fact be nefarious and have grave implications on...

Continue reading

Malware Analysis and Reverse Engineering: Analysing Magecart Skimmer

We explore the process of Malware Analysis and Reverse Engineering (MA&RE) by analysing Magecart’s skimming malware.

Continue reading

How Browser Extensions can Exploit User Activities for Malicious Operations

All browser extensions may not be malicious, but they are dangerous. We explain how extensions exploit permissions...

Continue reading