While perusing Twitter/X as a cybersecurity enthusiast, we encountered a post which highlights a MacOS Stealer by @mentalpositive as a […]

Suresh Reddy
July 2, 2025
While perusing Twitter/X as a cybersecurity enthusiast, we encountered a post which highlights a MacOS Stealer by @mentalpositive as a […]
Threat actors focus on gaining remote access and control of victims’ devices. For this they either use fake apps or […]
Remote Access Trojan (RAT) is a type of malware that, as the name suggests, can remotely access a victims’ system […]
It is not new for threat actors to abuse online advertising networks for their malvertising campaigns. But recently, we have […]
We came across this news and this tweet which spoke about how money lending apps (loan apps) on Google Play […]