News

For me, the biggest difference between a “gaming” mouse or keyboard and a regular one is the software. Gaming accessories ...
The Lumma Stealer is back after Microsoft and law enforcement took action to significantly disrupt the malware’s ...
The popular NPM package 'is' has been compromised in a supply chain attack that injected backdoor malware, giving attackers ...
A new variant of the Coyote malware is exploiting a Windows feature, the UI Automation framework, to steal users' banking and ...
Endgame Gear have apologised for unknowingly hosting malware-corrupted configuration software on their website, though claim ...
Coyote malware uses Windows UI Automation to target 75 banks and crypto sites in Brazil, risking credential theft.
In the sophisticated world of cybersecurity threats, fileless malware has emerged as one of the most elusive and dangerous forms of malicious software. This adv ...
Malware known as a "BadBox 2.0" has infiltrated over 10 million Android devices, including TV streaming devices, tablets, and ...
The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise ...
A new variant of the banking trojan 'Coyote' has begun abusing a Windows accessibility feature, Microsoft's UI Automation ...
A new Russia-based family of malware has been observed using a large language model (LLM) to issue commands on compromised systems in real time, which can potentially improve attacker capability by ...
Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.