The developers of the information stealer malware known as Rhadamanthys are actively iterating on its features, broadening its information-gathering capabilities and also...
A new wave of phishing messages distributing the QakBot malware has been observed, more than three months after a law enforcement effort...
A novel multi-platform threat called NKAbuse has been discovered using a decentralized, peer-to-peer network connectivity protocol known as NKN (short for New...
Cybersecurity researchers have identified a set of 116 malicious packages on the Python Package Index (PyPI) repository that are designed to infect...
A pro-Hamas threat actor known as Gaza Cyber Gang is targeting Palestinian entities using an updated version of a backdoor dubbed Pierogi....
The Iranian state-sponsored threat actor known as OilRig deployed three different downloader malware throughout 2022 to maintain persistent access to victim organizations...
Malware analysis encompasses a broad range of activities, including examining the malware’s network traffic. To be effective at it, it’s crucial to...
A phishing campaign has been observed delivering an information stealer malware called MrAnon Stealer to unsuspecting victims via seemingly benign booking-themed PDF...
Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis more challenging....
The Unified Extensible Firmware Interface (UEFI) code from various independent firmware/BIOS vendors (IBVs) has been found vulnerable to potential attacks through high-impact...
A Russian national has been found guilty in connection with his role in developing and deploying a malware known as TrickBot, the...
Cybersecurity researchers have disclosed a new sophisticated Android malware called FjordPhantom that has been observed targeting users in Southeast Asian countries like...
Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader known as WailingCrab. “The malware itself is split...
North Korean threat actors have been linked to two campaigns in which they masquerade as both job recruiters and seekers to distribute...
A new variant of the Agent Tesla malware has been observed delivered via a lure file with the ZPAQ compression format to...
Phishing campaigns delivering malware families such as DarkGate and PikaBot are following the same tactics previously used in attacks leveraging the now-defunct...
The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle of trigonometry...
Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate software such...
Government entities in the Middle East are the target of new phishing campaigns that are designed to deliver a new initial access...
The Vietnamese threat actors behind the Ducktail stealer malware have been linked to a new campaign that ran between March and early...
A new variant of the GootLoader malware called GootBot has been found to facilitate lateral movement on compromised systems and evade detection....