Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis more challenging....
The Unified Extensible Firmware Interface (UEFI) code from various independent firmware/BIOS vendors (IBVs) has been found vulnerable to potential attacks through high-impact...
A Russian national has been found guilty in connection with his role in developing and deploying a malware known as TrickBot, the...
Cybersecurity researchers have disclosed a new sophisticated Android malware called FjordPhantom that has been observed targeting users in Southeast Asian countries like...
Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader known as WailingCrab. “The malware itself is split...
North Korean threat actors have been linked to two campaigns in which they masquerade as both job recruiters and seekers to distribute...
A new variant of the Agent Tesla malware has been observed delivered via a lure file with the ZPAQ compression format to...
Phishing campaigns delivering malware families such as DarkGate and PikaBot are following the same tactics previously used in attacks leveraging the now-defunct...
The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle of trigonometry...
Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate software such...
Government entities in the Middle East are the target of new phishing campaigns that are designed to deliver a new initial access...
The Vietnamese threat actors behind the Ducktail stealer malware have been linked to a new campaign that ran between March and early...
A new variant of the GootLoader malware called GootBot has been found to facilitate lateral movement on compromised systems and evade detection....
An advanced strain of malware masquerading as a cryptocurrency miner has managed to fly the radar for over five years, infecting no...
Compromised Facebook business accounts are being used to run bogus ads that employ “revealing photos of young women” as lures to trick...
State-sponsored threat actors from the Democratic People’s Republic of Korea (DPRK) have been found targeting blockchain engineers of an unnamed crypto exchange...
Cybersecurity researchers have uncovered a new set of malicious packages published to the NuGet package manager using a lesser-known method for malware...
A pro-Hamas hacktivist group has been observed using a new Linux-based wiper malware dubbed BiBi-Linux Wiper, targeting Israeli entities amidst the ongoing...
A new cyber attack campaign has been observed using spurious MSIX Windows app package files for popular software such as Google Chrome,...
The Iranian threat actor known as Tortoiseshell has been attributed to a new wave of watering hole attacks that are designed to...
The popularity of Brazil’s PIX instant payment system has made it a lucrative target for threat actors looking to generate illicit profits...