Multiple threat actors have been observed using two new variants of the IcedID malware in the wild with more limited functionality that...
A new phishing campaign has set its sights on European entities to distribute Remcos RAT and Formbook via a malware loader dubbed...
A new information-stealing malware has set its sights on Apple’s macOS operating system to siphon sensitive information from compromised devices. Dubbed MacStealer,...
The North Korean advanced persistent threat (APT) actor dubbed ScarCruft is using weaponized Microsoft Compiled HTML Help (CHM) files to download additional...
The threat group tracked as REF2924 has been observed deploying previously unseen malware in its attacks aimed at entities in South and...
Poorly managed Linux SSH servers are being targeted as part of a new campaign that deploys different variants of a malware called...
A new piece of malware dubbed dotRunpeX is being used to distribute numerous known malware families such as Agent Tesla, Ave Maria,...
An Android voice phishing (aka vishing) malware campaign known as FakeCalls has reared its head once again to target South Korean users...
Copycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and infect Android and Windows...
Threat activity clusters affiliated with the Chinese and Russian cybercriminal ecosystems have been observed using a new piece of malware that’s designed...
Dero is a relatively new cryptocurrency that places a strong emphasis on privacy. It utilizes directed acyclic graph (DAG) technology, which allows...
A new Golang-based malware dubbed GoBruteforcer has been found targeting web servers running phpMyAdmin, MySQL, FTP, and Postgres to corral the devices...
This week, federal authorities in Los Angeles seized an internet domain that was being used to sell malicious software for computers. This...
Threat actors have been increasingly observed using AI-generated YouTube Videos to spread a variety of stealer malware such as Raccoon, RedLine, and...
The Dark Pink advanced persistent threat (APT) actor has been linked to a fresh set of attacks targeting government and military entities...
The malware downloader known as BATLOADER has been observed abusing Google Ads to deliver secondary payloads like Vidar Stealer and Ursnif. According...
A suspecting China-linked hacking campaign has been observed targeting unpatched SonicWall Secure Mobile Access (SMA) 100 appliances to drop malware and establish...
A North Korean espionage group tracked as UNC2970 has been observed employing previously undocumented malware families as part of a spear-phishing campaign...
Security vulnerabilities in remote desktop programs such as Sunlogin and AweSun are being exploited by threat actors to deploy the PlugX malware....
From the beginning of their existence, criminals have been abusing social networks, which have come to occupy an increasingly substantial piece of...
A never-before-seen complex malware is targeting business-grade routers to covertly spy on victims in Latin America, Europe, and North America at least...