News

Android malware poses a significant challenge for mobile platforms. To evade detection, contemporary malware variants use API substitution or obfuscation techniques to hide malicious activities and ...
A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that allow it to evade analysis and detection.
New research from Semperis suggests more than 10,000 SaaS apps could remain vulnerable to a nOAuth attack variant.
A new Secure Boot bypass flaw can be exploited to disable your PC’s security and install bootkit malware that runs every time you turn on your computer.
To disrupt the malware campaign, GTIG created custom detection methods that identify and remove APT41's Google Calendar accounts. The team also shut down the attacker-controlled Google Workspace ...
To effectively defend against sophisticated threats like this, organizations should implement targeted security measures. This includes enhanced monitoring of legitimate processes to detect unusual ...
It also offers deep metadata on artifacts, allowing detailed analysis of malware behavior and spread patterns. This makes PolySwarm both a live detection engine and a long-term intelligence resource.
OKX has officially resumed its decentralized exchange (DEX) operations with a new real-time abuse detection and blocking system designed to combat illicit activity.
Threat intelligence firm Recorded Future Inc. today announced the launch of Malware Intelligence, a new platform designed to automate the detection of emerging malware threats, speed up threat ...