News

Endgame Gear's mouse configuration tools were found to contain a remote access trojan and other malware, and the company has ...
Newly published research shows that the domain name system—a fundamental part of the web—can be exploited to hide malicious ...
Coyote malware uses Windows UI Automation to target 75 banks and crypto sites in Brazil, risking credential theft.
Malware known as a "BadBox 2.0" has infiltrated over 10 million Android devices, including TV streaming devices, tablets, and ...
The popular NPM package 'is' has been compromised in a supply chain attack that injected backdoor malware, giving attackers ...
The Lumma Stealer is back after Microsoft and law enforcement took action to significantly disrupt the malware’s ...
The Lumma infostealer malware operation is gradually resuming activities following a massive law enforcement operation in May ...
A new variant of the Coyote malware is exploiting a Windows feature, the UI Automation framework, to steal users' banking and ...
In the sophisticated world of cybersecurity threats, fileless malware has emerged as one of the most elusive and dangerous forms of malicious software. This adv ...
"As an immediate response, we thoroughly checked all our hosted software and firmware files for malware, confirming no other ...
A new Coyote malware variant abuses Windows tools to steal banking and crypto data. It tracks user activity via UI Automation ...
Endgame Gear have apologised for unknowingly hosting malware-corrupted configuration software on their website, though claim ...