BeatBankerBTMOB RATCybersecurityGoogle AndroidGReAT researchMalwareMalware descriptionsMalware TechnologiesMinerMobile MalwareMobile threatsRATTrojanTrojan Banker
BeatBanker: A dual‑mode Android Trojan
Recently, we uncovered BeatBanker, an Android‑based...
Phishing Attacks Against People Seeking Programming Jobs
This is new. North Korean hackers...
Arkanix StealerCybersecurityData theftGReAT researchInfostealersMalwareMalware descriptionsMalware TechnologiesMalware-as-a-ServicePythonTrojanTrojan-stealerUnix and macOS malwareWindows malware
Arkanix Stealer: a C++ & Python infostealer
Introduction In October 2025, we discovered...
AdwareBADBOXBotnetsCybersecurityGoogle AndroidKeenaduMalwareMalware descriptionsMalware TechnologiesMobile MalwareMobile threatsTriadaTrojanTrojan ClickerVo1d
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
In April 2025, we reported on...
The Promptware Kill Chain
Attacks against modern generative artificial intelligence...
Antivirus TechnologiesCybersecurityIncidentsLummaMalwareMalware descriptionsMalware TechnologiesOnline GamesSecurity technologyshellcodeTrojan-stealerWeb threatsWindows malware
The game is over: when “free” comes at too high a price. What we know about RenEngine
We often describe cases of malware...
CobaltStrikeCybersecurityDLL sideloadingGReAT researchIncidentsMalwareMalware descriptionsMalware TechnologiesshellcodeSupply-chain attackWindows malware
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
Introduction On February 2, 2026, the...
Supply chain attack on eScan antivirus: detecting and remediating malicious updates
On January 20, a supply chain...
Smashing Security podcast #452: The dark web’s worst assassins, and Pegasus in the dock
In episode 452, a London-based YouTuber...
Beware! Fake ChatGPT browser extensions are stealing your login credentials
If you’ve installed a browser extension...