The threat actors behind the Vidar malware have made changes to their backend infrastructure, indicating attempts to retool and conceal their online...
A new Golang-based information stealer called Skuld has compromised Windows systems across Europe, Southeast Asia, and the U.S. “This new malware strain...
A fully undetectable (FUD) malware obfuscation engine named BatCloak is being used to deploy various malware strains since September 2022, while persistently...
Researchers discovered a new form of attack that targeted home routers and altered the DNS settings to redirect the victims to a...
Recently, cybersecurity researchers uncovered that over 60,000 Android applications had been stealthily disguised as genuine software for the past six months. It...
An unknown threat actor has been observed targeting the U.S. aerospace industry with a new PowerShell-based malware called PowerDrop. “PowerDrop uses advanced...
A recent malware campaign has been found to leverage Satacom downloader as a conduit to deploy stealthy malware capable of siphoning cryptocurrency...
Spanish-speaking users in Latin America have been at the receiving end of a new botnet malware dubbed Horabot since at least November...
Traditional malware detecting methods are ineffective against the hackers’ new techniques – deploying malware that is obfuscated. That’s why an innovative new...
An analysis of the “evasive and tenacious” malware known as QBot has revealed that 25% of its command-and-control (C2) servers are merely...
A previously unknown advanced persistent threat (APT) is targeting iOS devices as part of a sophisticated and long-running mobile campaign dubbed Operation...
Bandit Stealer, a recently discovered information stealer by Trend Micro, effectively targets cryptocurrency wallets and web browsers while skillfully avoiding detection. The...
A new strain of malicious software that’s engineered to penetrate and disrupt critical systems in industrial environments has been unearthed. Google-owned threat...
Google has removed a screen recording app named “iRecorder – Screen Recorder” from the Play Store after it was found to sneak...
The infamous Lazarus Group actor has been targeting vulnerable versions of Microsoft Internet Information Services (IIS) servers as an initial breach route...
CERT-UA has identified and addressed a cyber attack on the government information systems of Ukrainian governmental state bodies. Through investigation, it was...
The North Korean advanced persistent threat (APT) group known as Kimsuky has been observed using a piece of custom malware called RandomQuery...
An unknown threat actor has been observed leveraging a malicious Windows kernel driver in attacks likely targeting the Middle East since at...
The identity of the second threat actor behind the Golden Chickens malware has been uncovered courtesy of a fatal operational security blunder,...
Two malicious packages discovered in the npm package repository have been found to conceal an open source information stealer malware called TurkoRat....
Malicious Google Search ads for generative AI services like OpenAI ChatGPT and Midjourney are being used to direct users to sketchy websites...