News

According to the initial report from Redditor Admirable-Raccoon597, the "trojanised" (infected) file was what users would ...
A new variant of the banking trojan 'Coyote' has begun abusing a Windows accessibility feature, Microsoft's UI Automation ...
The Lumma infostealer malware operation is gradually resuming activities following a massive law enforcement operation in May ...
Malware known as a "BadBox 2.0" has infiltrated over 10 million Android devices, including TV streaming devices, tablets, and ...
Endgame Gear mouse configuration tool was infected with a nasty bit of malware going by reports - a remote access trojan by the name of Xred.
Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.
The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise ...
First detected in July 2024, DCHSpy is assessed to be the handiwork of MuddyWater, an Iranian nation-state group tied to MOIS ...
A new study from antipiracy coalition the Alliance for Creativity and Entertainment (ACE), highlights the increased cyber ...
ACE-Commissioned Report Analyzes Exposure to Malware, Phishing, and Other Cyber Harms Associated with Piracy Use in Southeast ...
Hiding ransomware inside a CPU was strange but now, attackers are going even deeper and broader across networks. In a recent ...
An attack on a US accounting firm delivered PureRAT via Ghost Crypt, involving social engineering and advanced obfuscation ...