Attackers are using fake Claude Code install pages and malicious search ads to spread infostealer malware targeting Windows ...
BlackSanta is a malware module that kills EDR and AV at the kernel level prior to unleashing the malware’s final purpose.
A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware ...
Malicious JavaScript code delivered by the AppsFlyer Web SDK hijacked cryptocurrency, potentially in a supply-chain attack.
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Hackers are impersonating IT staff in Microsoft Teams to trick employees into installing malware, giving attackers stealthy ...
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
Six Android malware families discovered targeting banking apps and crypto wallets, exploiting accessibility features to steal funds and data.
APT28 deploys BEARDSHELL and COVENANT since April 2024 targeting Ukrainian military, enabling cloud-based espionage and persistent surveillance.
Scammers are using QR codes to trick people into paying them. Methods include sticking scam codes over legit ones on parking kiosks for example, or sending anonymous packages with QR codes.
The latest example is detailed by researchers at Aryaka, who this week described a campaign by an unnamed threat actor who is distributing resumés containing a malicious ISO file to HR departments. It ...
"Living Off the Land" attacks use built-in tools and processes instead of traditional malware.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results