News
According to the initial report from Redditor Admirable-Raccoon597, the "trojanised" (infected) file was what users would ...
A new variant of the banking trojan 'Coyote' has begun abusing a Windows accessibility feature, Microsoft's UI Automation ...
The Lumma infostealer malware operation is gradually resuming activities following a massive law enforcement operation in May ...
Malware known as a "BadBox 2.0" has infiltrated over 10 million Android devices, including TV streaming devices, tablets, and ...
Endgame Gear mouse configuration tool was infected with a nasty bit of malware going by reports - a remote access trojan by the name of Xred.
Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.
The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise ...
First detected in July 2024, DCHSpy is assessed to be the handiwork of MuddyWater, an Iranian nation-state group tied to MOIS ...
A new study from antipiracy coalition the Alliance for Creativity and Entertainment (ACE), highlights the increased cyber ...
Study Finds Consumers up to 65 Times More Likely to be Infected with Malware When Using Piracy Sites
ACE-Commissioned Report Analyzes Exposure to Malware, Phishing, and Other Cyber Harms Associated with Piracy Use in Southeast ...
Hiding ransomware inside a CPU was strange but now, attackers are going even deeper and broader across networks. In a recent ...
An attack on a US accounting firm delivered PureRAT via Ghost Crypt, involving social engineering and advanced obfuscation ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results