The newly discovered DarkRadiation ransomware chain is unlike any other ransomware family. Trend Micro cybersecurity researchers have shared findings of a newly identified ransomware...
The total amount of data collected by the malware includes nearly 26 million login credentials holding 1.1 million unique email addresses, 2...
Cybercriminals have started employing a new phishing attack that abuses the popularity of Google Drive and Docs to bypass security filters. In...
The researchers managed to identify and report the presence of Joker malware in 8 apps on Google Play Store. In the past...
Dubbed Vigilante by researchers; the malware prevents the system from those sites that redistribute pirated software/data. The IT security researchers at SophosLabs have...
The operators behind the REvil ransomware-as-a-service (RaaS) staged a surprise return after a two-month hiatus following the widely publicized attack on technology...
The work-from-anywhere economy has opened up the possibility for your human resources team to source the best talent from anywhere. To scale...
Microsoft on Tuesday warned of an actively exploited zero-day flaw impacting Internet Explorer that’s being used to hijack vulnerable Windows systems by...
An ongoing campaign has been found to leverage a network of websites acting as a “dropper as a service” to deliver a...
A recent wave of spear-phishing campaigns leveraged weaponized Windows 11 Alpha-themed Word documents with Visual Basic macros to drop malicious payloads, including...
The operators of the Mozi IoT botnet have been taken into custody by Chinese law enforcement authorities, nearly two years after the...
Threat actors are capitalizing on the growing popularity of proxyware platforms like Honeygain and Nanowire to monetize their own malware campaigns, once...
The security analysts from the cybersecurity firm Bitdefender have recently noted the new backdoor BADHATCH malware that was being used by the...
A financially motivated threat actor notorious for setting its sights on retail, hospitality, and entertainment industries has been observed deploying a completely...
A computer retail company based in the U.S. was the target of a previously undiscovered implant called SideWalk as part of a...
Dynamic-link library (DLL) side-loading is an increasingly popular cyberattack method that takes advantage of how Microsoft Windows applications handle DLL files. In...
ShadowPad, an infamous Windows backdoor that allows attackers to download further malicious modules or steal data, has been put to use by...
A Nigerian threat actor has been observed attempting to recruit employees by offering them to pay $1 million in bitcoins to deploy...
Cybersecurity researchers have disclosed details about an early development version of a nascent ransomware strain called Diavol that has been linked to...
The U.S. is presently combating two pandemics–coronavirus and ransomware attacks. Both have partially shut down parts of the economy. However, in the...
Pulse Secure has shipped a fix for a critical post-authentication remote code execution (RCE) vulnerability in its Connect Secure virtual private network...