A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency miners like...
Trend Micro’s recent threat hunting efforts have uncovered active exploitation of CVE-2023-36025, a vulnerability in Microsoft Windows Defender SmartScreen, by a new...
In a rapidly evolving digital landscape, it’s crucial to reevaluate how we secure web environments. Traditional antivirus-approach solutions have their merits, but...
Mockingjay is the name of an innovative process injection approach that has the potential to enable threat actors to avoid being detected...
Threat actors have been relying on exploitable drivers an increasing amount in order to circumvent security measures. Drivers are low-level system components...
Packers are becoming an increasingly important tool for cybercriminals to use in the commission of illegal acts. On hacker forums, the packer...
The security researchers at ESET found a new high-risk vulnerability in the UEFI firmware of Acer computers. Because to a security flaw...
The notorious Android banking trojan known as SharkBot has once again made an appearance on the Google Play Store by masquerading as...
Hackers are constantly looking for new ways to attack and infect PC users. And, for this, there is nothing better than taking...
Cybersecurity researchers have disclosed a new variant of the AvosLocker ransomware that disables antivirus solutions to evade detection after breaching target networks...
A Chinese-aligned cyberespionage group has been observed striking the telecommunication sector in Central Asia with versions of malware such as ShadowPad and...
Security researchers have disclosed a security issue that could have allowed attackers to weaponize the VirusTotal platform as a conduit to achieve...
While malware distributors may have a harder time getting their malicious apps through Google’s automatic scanning and flagging system, but, SharkBot shows...
ESET has recently published patches to fix a local privilege escalation vulnerability detected in all the clients of its Windows products that...
In yet another indicator of how hacking groups are quick to capitalize on world events and improvise their attack campaigns for maximum...
In its most recent report, the Cybersecurity and Infrastructure Security Agency (CISA) alerted users of Pulse Secure devices to the discovery of...
A new research published by a group of academics has found that anti-virus programs for Android continue to remain vulnerable against different...
Researchers have disclosed significant security weaknesses in popular software applications that could be abused to deactivate their protections and take control of...
EMSISOFT, Antivirus Firm revealed a data breach on one of their test systems. The company used the system to evaluate and benchmark...
In most cyberattack variants threat actors use legitimate-looking documents loaded with malware, which is why researchers often say it all starts with...
Researchers observed a new ransomware family called “Robinhood” that using a digitally signed vulnerable driver to bypass the protection by killing files...